February’s Top Cybersecurity News Stories: Nice Phish You Got There

Last month’s cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials’ identity protection habits and more.

The post February’s Top Cybersecurity News Stories: Nice Phish You Got There appeared first on Security Intelligence.

Continue reading February’s Top Cybersecurity News Stories: Nice Phish You Got There

An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot

An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.

The post An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot appeared first on Security Intelligence.

Continue reading An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot

IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.

The post IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies appeared first on Security Intelligence.

Continue reading IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

Necurs Spammers Go All In to Find a Valentine’s Day Victim

The cybergang behind the Necurs botnet launched a massive romance-themed spam campaign in the lead up to Valentine’s Day, impersonating single Russian women looking for dates online.

The post Necurs Spammers Go All In to Find a Valentine’s Day Victim appeared first on Security Intelligence.

Continue reading Necurs Spammers Go All In to Find a Valentine’s Day Victim

Six Major Data Breach Trends From 2017

The IBM X-Force team monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents and protect sensitive data.

The post Six Major Data Breach Trends From 2017 appeared first on Security Intelligence.

Continue reading Six Major Data Breach Trends From 2017

Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Social engineering schemes such as spear phishing rely on the human mind’s inclination toward self-deception to motivate users to open malicious links.

The post Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge appeared first on Security Intelligence.

Continue reading Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Frost & Sullivan Report Highlights Rise in Phishing Attacks

Financial institutions need intelligence-driven fraud detection and prevention solutions to protect customers’ sensitive data from phishing attacks.

The post Frost & Sullivan Report Highlights Rise in Phishing Attacks appeared first on Security Intelligence.

Continue reading Frost & Sullivan Report Highlights Rise in Phishing Attacks

Frost & Sullivan Report Highlights Rise in Phishing Attacks

Financial institutions need intelligence-driven fraud detection and prevention solutions to protect customers’ sensitive data from phishing attacks.

The post Frost & Sullivan Report Highlights Rise in Phishing Attacks appeared first on Security Intelligence.

Continue reading Frost & Sullivan Report Highlights Rise in Phishing Attacks

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks