article thumbnail

Real Big Phish: Mobile Phishing & Managing User Fallibility

Threatpost

Phishing is more successful than ever. Daniel Spicer, CSO of Ivanti, discusses emerging trends in phishing, and using zero-trust security to patch the human vulnerabilities underpinning the spike.

Phishing 109
article thumbnail

9 tips to prevent phishing

CSO Magazine

Phishing , in which an attacker sends a deceptive email tricks the recipient into giving up information or downloading a file, is a decades-old practice that still is responsible for innumerable IT headaches. The fight against phishing is a frustrating one, and it falls squarely onto IT's shoulders.

Phishing 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 top anti-phishing tools and services

CSO Magazine

Phishing continues to be one of the primary attack mechanisms for bad actors with a variety of endgames in mind, in large part because phishing attacks are trivial to launch and difficult to fully protect against. Why phishing is successful. Most phishing attacks are less about the technology and more about social engineering.

Phishing 136
article thumbnail

What are phishing kits? Web components of phishing attacks explained

CSO Magazine

Editor's note: This article, originally published on August 7, 2018, has been updated to include new information on phishing kit features. Phishing is a social attack, directly related to social engineering. Commonly centered around email, criminals use phishing to obtain access or information.

Phishing 118
article thumbnail

How attackers could exploit breached T-Mobile user data

CSO Magazine

These include SMS/text-based phishing, SIM swapping and unauthorized number porting. Related: The T-Mobile data breach: A timeline | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here

Mobile 144
article thumbnail

Previously undocumented backdoor targets Microsoft’s Equation Editor

CSO Magazine

Sign up for CSO newsletters. ]. Spear-phishing attack targets Russian defense contractor. In this instance, the target of the spear-phishing attack was a general director working at the Rubin Design Bureau, a Russia-based defense contractor that designs nuclear submarines for the Russian Federation’s Navy.

CSO 129
article thumbnail

Top cybersecurity statistics, trends, and facts

CSO Magazine

This historic increase in cybercrime resulted in everything from financial fraud involving CARES Act stimulus funds and Paycheck Protection Program (PPP) loans to a spike in phishing schemes and bot traffic. Get the latest from CSO by signing up for our newsletters. ] Learn the The 5 types of cyberattack you're most likely to face. |

CSO 138