Email Security Best Practices to Help You Reel In the Threat of Phishing

Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices.

The post Email Security Best Practices to Help You Reel In the Threat of Phishing appeared first on Security Intelligence.

Continue reading Email Security Best Practices to Help You Reel In the Threat of Phishing

Hackers phish Butlin’s holiday camp chain, access customers’ personal data

Fabled British holiday camp chain Butlin’s has admitted that it has suffered a data breach that may have exposed details of 34,000 guests. Personal information contained within the records accessed by hackers includes names, booking reference num… Continue reading Hackers phish Butlin’s holiday camp chain, access customers’ personal data

‘Password Check Required Immediately’ – most effective phishing line

Leveraging a key human trait that machines would not fall for, cybercriminals can easily manipulate or fool humans using social engineering tactics. A new study on the most effective phishing scams shows that, ironically, the subject lines relating to … Continue reading ‘Password Check Required Immediately’ – most effective phishing line

Virginia Bank falls victim to two phishing scams, loses $2 million

No matter how hard security companies work on improving detection and teaching employees about insider threats and risks, corporate environments are still falling to cover the most basic and common attack vector – phishing scams. You’d defi… Continue reading Virginia Bank falls victim to two phishing scams, loses $2 million

How to Recognize a Business Email Compromise Attack

Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data.

The post How to Recognize a Business Email Compromise Attack appeared first on Security Intelligence.

Continue reading How to Recognize a Business Email Compromise Attack

Recent Flash Zero-Day Flaw Now Exploited in Widespread Attacks

A vulnerability that was recently patched in Flash Player after being used in targeted attacks is now seeing widespread exploitation in a malicious spam campaign. The flaw was first identified in late January by security researchers who saw it used in … Continue reading Recent Flash Zero-Day Flaw Now Exploited in Widespread Attacks

Beware of the Latest Punycode Attacks

In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.

The post Beware of the Latest Punycode Attacks appeared first on Security Intelligence.

Continue reading Beware of the Latest Punycode Attacks