Displaying items by tag: phishing attacks

There has been a significant rise in phishing email attacks related to HR topics, particularly regarding new policies that would affect all employees throughout organisations, according to global security awareness training and simulated phishing platform provider KnowBe4.

Published in Security

GUEST OPINION by Ashley Diffey, Ping Identity Country Manager Australia, New Zealand and Japan: Since the early days of the information technology revolution, the task of ensuring effective digital security has relied on the humble password. Used to confirm an individual’s identity, they’ve acted as the keys to vital systems and data stores.

Published in Guest Opinion

GUEST OPINION by Simon Howe, Vice President Sales – APAC, LogRhythm: With large numbers of people now sitting in home offices in the wake of the COVID-19 pandemic, attention is turning to what this means when it comes to achieving effective IT security.

Published in Guest Opinion

GUEST OPINION by Joanne Wong, Vice President – International Marketing, LogRhythm:  It’s something almost every internet user has experienced. An email arrives, purporting to be from a trusted source, but in reality it’s an attempt to steal personal details or cause disruption.

Published in Guest Opinion
Wednesday, 15 July 2020 15:05

How Hackers Can Abuse Contact Tracing Apps

By ProPrivacy

VENDOR PROMOTION Contact tracing apps could do a lot of good, but not if hackers get in the way. Here’s a quick list of three ways cybercriminals can abuse these apps.

Published in Guest Opinion
Wednesday, 15 July 2020 13:56

How Hackers Can Abuse Contact Tracing Apps

VENDOR PROMOTION Contact tracing apps could do a lot of good, but not if hackers get in the way. Here’s a quick list of three ways cybercriminals can abuse these apps.

Published in Security

GUEST OPINION By Mark Padginton, Key Account Manager JAMF: Most Australian businesses have deployed tools and services to improve their IT security, yet many remain vulnerable due to one key factor: human beings.

GUEST OPINION By Mark Padginton, Key Account Manager JAMF: Most Australian businesses have deployed tools and services to improve their IT security, yet many remain vulnerable due to one key factor: human beings.

Published in Security

There has been a spike in ransomware attacks as cybercriminals capitalise on the COVID 19 pandemic, according to a new report which found that ransomware attacks can be correlated to key days in the COVID-19 news cycle - suggesting attackers are being “nefariously opportunistic” and leverage breaking news to take advantage of vulnerable populations. 

Published in Security

Ninety-four percent of organisations globally have suffered phishing attacks in the last 12 months and 61% say it is likely or inevitable that they will be hit with an email-borne attack, according to a new survey.

Published in Security

Cyber criminals continue to use email as a primary vehicle to steal data and deliver advanced threats, according to one security firm which reveals that phishing attacks targeting email users were the most prominent type of cyber attack globally in 2018.

Published in Security

Verizon, the largest US telco, has warned that data breaches are on rise around the world but bemoans the fact that despite being repeatedly told organisations don’t seem to be heeding the messages about the risk of attacks and are failing to implement basic defences and training.

Published in Security

Security firm F-Secure says a hacking experiment it conducted in the UK highlights the dangers of using public Wi-Fi which it claims is “inherently insecure”.

Published in Security

More than $80 million was lost to scams in Australia last year, with scammers stealing not only money but data. Computer prediction software scams targeting investors were also prevalent.

Published in Security

Intel’s Security arm McAfee isn’t the first to write about hacking the human OS, and it won’t be the last, with the ‘latest persuasion techniques’ revealed.

Published in Security

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments