IT Brief UK - Technology news for CIOs & IT decision-makers

Social Engineering stories - Page 6

Story image
2019 threat landscape predictions - Proofpoint
Tue, 18th Dec 2018
#
malware
#
email security
#
cybersecurity
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Story image
Businesses too slow on attack detection – CrowdStrike
Thu, 13th Dec 2018
#
malware
#
ai security
#
ai
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Story image
Back to the basics: Five ways to stay safe online
Tue, 16th Oct 2018
#
firewalls
#
network infrastructure
#
network security
Phishing attacks or social-engineering attacks are on the rise, where cybercriminals trick people into divulging details and participating in scams.
Story image
New research reveals which employees are being targeted for why
Wed, 12th Sep 2018
#
phishing
#
email security
#
proofpoint
Individual contributors and lower level management account for nearly two thirds (60%) of highly targeted attacks within an organisation.
Story image
Collaboration tool APIs leaving organisations vulnerable
Mon, 9th Jul 2018
#
uc
#
firewalls
#
breach prevention
Alongside the migration to the cloud has been the rise of application programming interfaces (APIs) and artificial intelligence (AI).
Story image
Internet security researcher seeking assistance from cybercrime victims
Wed, 27th Jun 2018
#
phishing
#
email security
#
social engineering
Auckland researcher seeks 1000 Kiwi internet users to assist in a project to understand human risk factors in cybersecurity. #CybersecurityNZ.
Story image
All in a day's work: Why hackers hack and how they do it
Thu, 12th Apr 2018
#
hackers
#
nuix
#
social engineering
It can take hackers less than an hour to steal data from an organisation, and most of the time their targets don’t even detect the attacks.
Story image
CERT Australia reveals this year's cybersecurity challenges
Tue, 27th Feb 2018
#
phishing
#
iot
#
email security
Criminals will exploit known vulnerabilities; social engineering will craft sophisticated networks; supply chain targeting will target third parties..
Story image
Barracuda acquires social engineering platform PhishLine
Thu, 11th Jan 2018
#
firewalls
#
phishing
#
email security
PhishLine’s social engineering simulation and training platform expands Barracuda solutions to protect against email-borne targeted attacks.
Story image
CASE STUDY: How cybercriminals targeted QLD law firm with social engineering
Tue, 9th Jan 2018
#
cybersecurity
#
case study
#
cybercrime
Cybercriminals stole millions from Queensland law firms using a simple email scam, tricking lawyers into revealing their login passwords.
Story image
Staff web usage: To filter, or not to filter...
Mon, 30th Jun 2014
#
phishing
#
hcm
#
email security
SMEs face a constant dilemma: trust staff or monitor their web use. Web filtering can safeguard companies legally and financially, and boost MSP revenue.
Story image
Shock, horror: Mobility and social networking the new target for cyber miscreants
Wed, 12th Sep 2012
#
smartphones
#
email security
#
personal computing devices
Cyber miscreants are now targeting mobile phones and social networks, as Norton reports a twofold increase in threats compared to a year ago.
Story image
Spam shrinks as scammers go social
Tue, 1st May 2012
#
nz
#
symantec
#
cloud services
Spam declines by 32%, but cyberattacks surge as scammers exploit social networks and mobile phones, says Symantec's 2011 report.
Story image
Check Point Experience 2011: Security Evangelism
Thu, 8th Sep 2011
#
malware
#
cybersecurity
#
linkedin
At Check Point Experience 2011, Tomer Teller highlighted that no security tech can counter human error, as hackers increasingly exploit social engineering.
Story image
New threats need new defences
Wed, 1st Sep 2010
#
malware
#
cybersecurity
#
facebook
Symantec warns that anti-virus software alone can't combat new online threats, stressing the need for multi-layered security in the digital age.