A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.
Stories by Steve Ragan
A recent study from Google and UC Berkeley examined the various ways accounts are compromised, and determined that phishing attacks – not data breaches – pose the most risk to users when it comes to lost access.
Researchers at Carbon Black examined the Ransomware market and discovered some interesting facts about the booming criminal economy. Mirroring some of the legal technology markets, such as those for software development, the market for Ransomware is dominated by unique custom solutions and turnkey offerings.
Hacking Team, a firm best known for helping governments spy on their citizens, has been hacked. Here's a curated look at the documents, contracts, and code discovered by researchers sorting the data online.
Common Phishing techniques were less effective last year, so criminals changed their game in order to adapt
While having instant access to your information via the Cloud is a major bonus to productivity and convenience, there's a risk that the security trade-off will be too high.
Black Duck Software presents 5 tips for a secure enterprise relationship with open source.
Since news of the OpenSSL bug started to spread on Monday, administrators and vendors have made a mad scramble to patch the Heartbleed bug, named for the flawed implementation of the heartbeat option in the cryptographic library.
In the spirit of Halloween, CSO recently spoke to Adam Stewart, the Vice-President of Engineering at Autotask, to outline the most frightening aspects of working in IT.