Phishing attacks are on the rise, due in large part to how easy to launch and lucrative they are for the attackers, says Brooke Satti Charles of IBM Trusteer.
"Phishing is a really easy way to perpetrate an attack," says Satti Charles, a financial crime prevention strategist. "Creating a sophisticated way to break...
If you're thinking, "Mobile threats and malware are still in their infancy and the risk isn't significant enough yet," it's time to think again. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap fraud, and fraudsters' increasing use of mobile devices in cross-channel attacks...
Midway through 2017, phishing attacks are very much on the rise, namely because they are too easy to launch and far too lucrative for the attackers, says Brooke Satti Charles of IBM Security Trusteer.
As more and more sensitive data passes through and resides on mobile endpoints, unique security challenges are created for enterprises.
To ensure your organisation is secure, what are the top threats that you must prepare to face?
Download this checklist of the top ten mobile threats, and learn how you can...
Social engineering is not a new concept, but it is an enduring one that is steadily growing, with no end in sight.
One of the most common social engineering schemes is phishing, which is defined as "the use of social engineering and technical subterfuge to defraud an online account holder of their financial...
Former FBI Director James Comey trickled out new details during a Senate Intelligence Committee hearing about what the FBI knew and when regarding Russia's alleged cyber intrusions. We've rounded up the details.
A cyber-espionage campaign apparently linked to Russia has targeted more than 200 people in 39 countries and leaked victims' stolen information - sometimes in altered form - as part of a disinformation campaign, according to privacy researchers at Citizen Lab.
From ransomware to business email compromise, most of today's Internet scourges - in spite of vast differences in their appearances - are related to each other and depend on a small number of reused adversarial techniques. Decomposing the threats into these atomic building blocks is helpful to understand the nature of...
Three Nigerian nationals who were convicted of a range of charges - including identity theft and payment card fraud - have been sentenced in the U.S. to serve up to 115 years in jail. Prosecutors says they were part of a "large-scale international fraud network" and involved in so-called "romance scams."
A new phishing site just popped up targeting your online banking customers. Many of your end users who land on the page won't realize they're about to disclose their login or payment card information to fraudsters.
How can you help your customers before they disclose their credentials?
Download this whitepaper...
In a rare acknowledgment of a data breach by an Indian company, online restaurant guide and food ordering service Zomata says 17 million users' email addresses and hashed passwords were stolen from its database. The company was hacked by a white-hat hacker back in 2015.
Hackers have reportedly exploited the SS7 mobile telecommunications signaling protocol to drain money from online bank accounts used by O2 mobile phone subscribers. Despite rising security worries relating to SS7, many telcos have yet to explore related fixes.
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
The purported hacking of computers of French presidential candidate Emmanuel Macron, by the same Russian group that targeted Hillary Clinton's campaign, signifies an expansion of the goals of the attackers that extend beyond trying to influence the outcome of Western elections.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.