April 18, 2016 CEO Fraud: Email Scammers Reading Between the Lines? 2 min read - Business email compromise (BEC) attacks are targeting executives to carry out high-priced CEO fraud, which is often called whaling.
March 7, 2016 New W-2 Phishing Attacks Tax Corporate Patience 2 min read - Cybercriminals are targeting organizations via phishing attacks that attempt to steal W-2 tax forms and personal or financial data.
February 8, 2016 Google Extends Safe Browsing to Fake Buttons 2 min read - Chrome's safe browsing setting will now warn users about embedded content, such as fake download buttons, that aims to carry out social engineering.
January 25, 2016 Degree of Compromise? Sensitive Information Stolen From University of Virginia HR System 2 min read - Cybercriminals recently hacked into the University of Virginia's HR department, compromising the sensitive information of 1,400 school employees.
December 28, 2015 Whaling Dominates the Latest Wave of Phishing Attacks 2 min read - Phishing attacks combined with social engineering aimed at employees is called whaling, and it's the latest hot cybercrime trend.
Banking & Finance December 3, 2015 Charity Fraud Trifecta: Phishing, Vishing and Smishing 6 min read - The holiday season is upon us and charity fraud is a concern once again, just as it has been in the past. Here's what consumers need to know.
X-Force November 23, 2015 A Kitten and an Information Security Analyst Walk Into a Bar… 3 min read - What happens when a kitten and an information security analyst walk into a bar? In one scenario, the kitten teaches the expert some things about security.
November 11, 2015 Friday Is Peak Malware Distribution Day, Study Shows 3 min read - Malware distribution tends to peak on Friday, according to a new study from Cyren. Here's what else the report had to say about cyberthreats.
November 6, 2015 OmniRAT Takes Over Android Devices Through Social Engineering Tricks 2 min read - Cybercriminals could be leveraging remote tools such as OmniRAT to take over Android devices and steal data from unsuspecting victims.
Identity & Access November 6, 2015 Social Engineering Attackers Deploy Fake Social Media Profiles 2 min read - Cybercriminals are using social engineering tactics on social media networks such as LinkedIn to gain access to corporate networks.