Phishing

Human behaviour is the new perimeter: Matt Moynahan, Forcepoint

Digital identities will be the ultimate weapon for CSOs against the hackers says Matt Moynahan, CEO, Forcepoint.

Seqrite launches Seqrite Secure Web Gateway for enterprises

Built on a powerful machine learning engine, Seqrite SWG offers protection against advanced Web threats 

Burning down the house: CEO attitudes to cyber security all wrong

Security In Depth has just published the results of research which found 83 per cent of Australian companies have no policies or plan in place for a data breach and 41 per cent said they “did not understand” what an ICT security framework was.

Over one third of all phishing attacks target financial sector customers in Q2 2018

Attacks on customers of financial organizations, including banks, payment systems, and e- shop transactions, are an enduring trend in cybercrime and involve the theft of money as well as of personal data.

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month, shows that malevolent hackers can introduce this vulnerability, even in environments that were previously considered low-risk for this attack.

Widespread vulnerabilities in mobile point-of-sale readers

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

How CIOs should respond to a data breach

How prepared is your organisation to deal with the fallout from a cyber attack?

Seqrite detects more than 1.5 lakh incidents related to the Emotet Trojan

Reveals how the infamous Trojan has evolved into a complex malware capable of delivering multiple attack payloads such as Banking Trojans.

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

Partner Content
Email-borne cyber attacks: A constant security threat

The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once.

Partner Content
Bharat Vikas Group streamlines administrative control and combats malware attacks with Seqrite EPS

One of the major concerns analyzed by the IT and Security team of BVG India Ltd. was malware and ransomware attacks. The suspected reasons behind these attacks were phishing emails or unauthorized web browsing.