- DARPA makes finding software vulnerabilities fun
- Flashlight app vendor settles with FTC over privacy violations
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- NSA cites Reagan-era executive order to justify collection of cellphone location data
- NSA spies on Italians from roof of US Embassy in Rome, magazine reports
- MenuetOS inches towards 1.0
- Senate orders release of Coalition's NBN review
- Brandis quizzed over PM's understanding of metadata
- Black Friday bargains prompt consumers to self-gift iPad Air
- US faces major Internet image problem, former gov't official says
phishing in pictures
The National Australia Bank (NAB) has warned customers about an email scam which claims that access to their accounts is restricted.
Phishing attacks on enterprises can be calamitous in terms of compromised networks or damaged brand names, and the Anti-Phishing Working Group (APWG), which aggregates and analyzes phishing trends data worldwide, offers some of the best insight from industry into what's occurring globally in terms of this cybercrime. The following list of frequently asked questions about phishing is derived from the APWG's April report that covers the period July-December 2012 worldwide.
The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money.
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
A year after Google, Microsoft and other email heavyweights launched the DMARC program to filter out spoofed email that attackers use for phishing, they say an estimated 60% of the world's email boxes are now safe.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
In recent weeks, more and more iTunes users have been reporting fraudulent activity on their Apple accounts, reporting hundreds or even thousands of dollars worth of bogus purchases. With the reports of this type of fraud on the uptick in recent weeks, many users have been quick to blame Apple or PayPal, as many of the affected iTunes accounts were linked to PayPal accounts.
A new, incredibly sneaky identity-theft tactic surfaced earlier this week when Mozilla's Aza Raskin, the creative lead of Firefox, unveiled what's become known as "tabnapping."
It came across my Twitter feed in the early morning, a sea of users all sending the same message: "Want to know whos stalking you on twitter!?: http://TwitViewer.net."
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Most of us don't like paying for antivirus (AV) software, but at least home users can rely on one of the free options, such as Microsoft Security Essentials, avast!, or AVG Free.
Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown without the knowledge of the owner.
The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt.
Whitepapers about phishing
At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.
The new frontier of mobile and social is a game changer, opening new channels in which consumers and brands can interact. This whitepaper details the results of a survey spanning consumers in the US, UK, Singapore and Australia, exploring their expectations of using mobile devices and social media to engage with brands. The results confirm that consumers live across various channels, and as part of their experience there is an expectation of consistency, value and individualised attention. Read more to learn who you’re talking to, what to say and where to say it.
DriverScanner scans your computer and provides you with a list of drivers that need to be updated. All you have to do, then, is simply ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest