Social Engineering

Spear phishing: Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

Cyber criminals to use AI to anticipate executive movements: Report

Attackers will implement emerging tech to launch sophisticated phishing attacks in 2019, reveals a report by Trend Micro. 

Digital security and privacy: A must for organizations

Digital Security and privacy concerns are everyone’s challenge as technology touches every aspect of our lives today.

India ranks 12th world wide when it comes to web surfing dangers: Report

Q3 in India saw that 32.8 percent of users were attacked by web-borne threats between July and September 2018.

Email based cyberattacks remain one of the most vulnerable vectors: Report

Cybercriminals use social engineering techniques to trick users into providing login credentials, initiating fraudulent transactions or unknowingly install ransomware.

Gartner survey says cloud computing remains top emerging business risk

Latest Emerging Risks Report reveals new threats to global enterprises as cloud growth booms.

Widespread vulnerabilities in mobile point-of-sale readers

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

Partner Content
Tailgating: Security Risks Involved

Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

The biggest data breaches in the ASEAN region

Why data breaches are a major problem in the ASEAN region & a list of the most serious incidents in the recent years