Symantec Security Report Turns Conventional Wisdom Upside Down
Symantec security report turns conventional wisdom upside down. Small businesses thought they were immune from social engineering attacks. Not so.
Our stories and latest developments.
Symantec security report turns conventional wisdom upside down. Small businesses thought they were immune from social engineering attacks. Not so.
RSA, a division of EMC, publishes a monthly report details statistics related to online fraud. The January 2013 report,
The types of phishing are defined in this post. This list defines phishing, spear-phishing, clone phishing, and whaling.
Symantec addresses new and unique Facebook-specific attacks. A typical characteristic of phishing attacks is their ability to adapt with the times. With the rise of social media, the bad guys have found seemingly infinite opportunities to scam unsuspecting users. After all, social media is predicated on the unfiltered exchang
Kaspersky Lab, a provider of antivirus and Internet security software, recently published its review of e-mail spam malicious attacks across 2012. The results are a classic mix of good news and bad news.
When Microsoft security experts offer advice, organizations should listen, particularly with regards to social engineering attacks. Microsoft has provided insight into social engineering attack prevention and mitigation.
Although there is value in onsite social engineering, for the money offsite social engineering, such as that provided by PhishingBox is much more cost effective. Only in rare circumstances, will attackers attempt anything that require their physical presence. As such, most organizations do not need onsite testing.
Password weaknesses can be exploited. Today, users are susceptible to social engineering because they access more web-based systems. With the increased adoption of cloud computing, users are logging int