Security News

Phishing and spearphishing: A cheat sheet for business professionals
2019-01-08 22:05

When criminals use technology to propagate social engineering attacks, securing your organization can become complicated. Here's what you need to know about phishing and spearphishing.

SMS phishing is alive and well… and simply believable
2019-01-08 17:19

Sometimes, the limited length of an SMS makes it easier for the crooks to 'get it to look right' and reel you in to a phishing site...

How to tackle phishing with machine learning
2019-01-08 15:25

​Learn how one company is capitalizing on machine learning to address phishing problems.

Latest Phishing Technique Uses Fake Fonts to Evade Detection
2019-01-07 15:09

New Phishing Template Targets Users of Major U.S. Bank A phishing template used in recent attacks targeting the users of a major U.S. bank uses fake fonts to evade detection, Proofpoint security...

Fake 'U's! Phishing creeps use homebrew fonts as message ciphers to evade filters
2019-01-04 23:35

fg xjc dua ihut vyfq, xjc uih jci sfat jg mjggfa A new phishing campaign that uses a custom font to hide its tracks and evade detection has been uncovered.…

The challenges with preventing phishing attacks: An insider's perspective
2019-01-04 21:29

​Phishing attacks remain rampant and are expected to continue to do so in 2019. Learn an insider's perspective on the difficulties combating them.

Phishing Tactic Hides Tracks with Custom Fonts
2019-01-04 17:21

The phishing campaign is using a new technique to hide the source code of its landing page - and stealing credentials from customers of a major U.S.-based bank.

Phishing toolkit uses custom font and substitution cipher to evade detection
2019-01-04 16:49

A vintage spycraft tool was updated for the technological age as cybercriminals attempt to evade programmatic detection.

Apple Phone Phishing Scams Getting Better
2019-01-03 19:21

A new phone-based phishing scam that spoofs Apple Inc. is likely to fool quite a few people. It starts with an automated call that display's Apple's logo, address and real phone number, warning...

Evasive Malware, Meet Evasive Phishing
2018-12-28 15:38

In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece of malware had grown in number and sophistication—the...