phishing - search results
If you're not happy with the results, please do another search
Cybersecurity horror stories and how to avoid them
By Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity
2023 has seen a host of malicious cyber-attacks targeting a range of organisations from police forces...
How the AI era has fundamentally altered the cyberthreat landscape
By Matt Lindley, COO and CISO at NINJIO
The AI mania over the past year has been illuminating in many ways. Despite the emergence of...
Eight Ways to Bolster Your Cybersecurity Resources Without Blowing Your Budget
By Karen Lambrechts, Lansweeper
IT security breaches are becoming more frequent and costly. According to IBM Security’s Cost of a Data Breach Report 2023 UK...
Ten 10 ways Senior Citizens and Disabled can stay cyber safe and secure online
In today's digital age, online banking and services have become invaluable tools, especially for disabled and senior citizens who can now access essential services...
Marina Bay Sands Singapore suffers Information Security Breach
Marina Bay Sands (MBS), the renowned resort and luxury hotel situated in Singapore, recently experienced a data breach that impacted the personal information of...
Exploring Different Types of Cybersecurity: Protecting the Digital Realm
In our increasingly interconnected world, the importance of cybersecurity cannot be overstated. The rapid advancement of technology has led to more sophisticated cyber threats,...
QR Codes are a Security Blindspot
By Mary Blackowiak, Director of Product Management and Development, AT&T Business
Whether at the grocery store, eating dinner at a restaurant, locating a gate at...
Follow these cybersecurity tips while shopping for this Christmas 2023
Christmas 2023 is swiftly approaching, and many have already begun their lists of gifts for loved ones this holiday season. While some still adhere...
Weighing the Risks and Rewards of Generative AI for Business
by Matt Cloke, CTO at Endava
Generative AI is poised to unleash the next wave of productivity, transform roles and boost performance across functions such...
Seventh-annual Hacker-Powered Security Report Reveals Hackers’ Plans for GenAI, Bounty Milestones and More
HackerOne has just released its seventh-annual Hacker-Powered Security Report, based on data from its vulnerability database, views from HackerOne customers and more than 2,000 hackers...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...