phishing - search results
If you're not happy with the results, please do another search
More than 1 million Google accounts compromised in Gooligan Cyber Attack
NBC4 News reports that a new malware attack campaign called “Gooligan” is said to have compromised more than 1 million Google accounts so far....
Ransomware+: A New Shade of Evil
Ransomware has become an ever growing topic of conversation and concern in the security community during the last several years. According to the ZDNet...
Survey says Cyber attacks on Irish Law Firms has increased
Irish Law Firms have witnessed a 50 percent increase in cyber attacks in the past 12 months. It is estimated that 38 percent of...
Oracle to buy cyber attacked Dyn!
Oracle Corporation based in California has made an official announcement that it is going to buy Dyn- the internet traffic company which witnessed a...
Study confirms Manufacturing companies are more vulnerable to Cyber Attacks
Companies involved in manufacturing business are said to be more exposed to cyber attacks. This was revealed in a Deloitte study, titled Manufacturers Alliance...
Google to Label Unsafe Websites as ‘Repeat Offenders’
Safari, Firefox and Chrome are set to exhibit 'deceptive' warning covering one full web-page for those sites which seem to purposely disseminate phishing pages,...
Password change doesn’t boost your enterprise cyber security
As data security concerns are increasing day by day, most security experts say that frequent password change can bolster enterprise cyber security. But this...
Enhanced Norton Mobile Security for Android: Privacy and Security Protection Features
Norton by Symantec, which is no doubt one of the most renowned security solution providers in the cyber world, presents their up-to-date flagship mobile...
How Do You Define Prevention?
Scott Simkin wrote an interesting post about How Do You Define Prevention? that I would like to share.
"In discussions about cybersecurity, a word that gets...
Hacking the Presidential Election: Can It Happen?
Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.
Earlier...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...