What is phishing? Learn how this attack works
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this increasingly sophisticated form of cyberattack.
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this increasingly sophisticated form of cyberattack.
Credit to Author: Sushmita Kalashikar| Date: Wed, 21 Aug 2019 13:09:28 +0000
In the latest of its kind phishing attacks, phishers have been found to use custom 404 Not Found error pages to run phishing campaign. This unusual phishing campaign is basically aimed at tricking unsuspecting victims into sharing their Microsoft login credentials. A 404 Not Found page is typically an indication…
Read moreCredit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000
In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…
Read moreCredit to Author: Lisa Vaas| Date: Tue, 27 Aug 2019 09:56:31 +0000
Prolific phishing scammer Grant West has been sentenced to 10 years, 8 months, and reimbursement for victims.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/sHYkSkwLCAs” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Fri, 23 Aug 2019 14:08:23 +0000
If the phishing page looks OK, and it has an HTTPS padlock, how are you supposed to spot phishes these days? Read our tips…<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/JksWcX1iM6g” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Alice Duckett| Date: Thu, 22 Aug 2019 11:53:03 +0000
Episode 5 of the Naked Security Podcast is now live – listen now!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/zjk5iFHuftQ” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Danny Bradbury| Date: Thu, 22 Aug 2019 10:32:26 +0000
The hacking group, which specialises in stealing from banks, has been spreading its coverage and becoming more sophisticated.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/harEaJXHeBo” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Todd VanderArk| Date: Tue, 20 Aug 2019 16:00:56 +0000
Learn about common vulnerabilities and what you can do to protect your company from attacks.
The post One simple action you can take to prevent 99.9 percent of attacks on your accounts appeared first on Microsoft Security.
Read moreCredit to Author: Paul Ducklin| Date: Tue, 20 Aug 2019 15:34:37 +0000
Here’s an interesting phishing trick. It’s a way for crooks to get lots of customised web links without doing any programming.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/YJwPC_v71rM” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 19 Aug 2019 17:55:50 +0000
![]() | |
A roundup of the most interesting cybersecurity news stories from August 12 to 18, including a deep dive into facial recognition technology, swatting dangers, social engineering attacks on cities, and more. Categories: Tags: AndroidfacebookGooglepasswordphishphishingroundupweek in security |
The post A week in security (August 12 – 18) appeared first on Malwarebytes Labs.
Read more