DoH and Phishing Risks. What You Need to Know Now

As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data is collected and sold without our knowledge and consent, it has made employees and consumers more aware of the potential privacy risks to … Continue reading DoH and Phishing Risks. What You Need to Know Now

Phishing 2.0 is Here — Make Sure You’re Prepared

Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threat vectors, such as SMS, social media, browser extensions to attack through actions such as credential stealing, rogue software, scareware, fake virus alert… Continue reading Phishing 2.0 is Here — Make Sure You’re Prepared

Twitter Hack—Old Dog, New Tricks

The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of phishing sites each day because cybercriminals see it as an easy way to make money. Here are a few examples.
The post Twitter Hack—Ol… Continue reading Twitter Hack—Old Dog, New Tricks

Mobile Phishing, the Next Battleground

With the rising popularity of iOS and Android devices for everything from sending a client an SMS to attending a Zoom call, it was only a matter of time before cybercriminals seized the opportunity to target users through the least protected and most p… Continue reading Mobile Phishing, the Next Battleground

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email.  They break down these phishing attack vectors in this way: Messaging – 17% Social Media – 16% Gaming… Continue reading Going Beyond Awareness Training to Protect Mobile Devices from Phishing

Rethinking Endpoint and Mobile Security for Remote Workers

With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT security teams to rethink their endpoint security strategies. VPN tunneling enables remote users to benefit fro… Continue reading Rethinking Endpoint and Mobile Security for Remote Workers