Why More and More Phishing Attacks are Going After Mobile Users

Why More and More Phishing Attacks are Going After Mobile Users

Phishing attacks are hard to stop because hackers are extremely sophisticated and they use every method available. What hackers have discovered is that one of the best methods available is to target mobile devices. As challenging as it is for users to identify well-constructed phishing emails on a desktop, it’s

Read More
Phishing in the News

Phishing in the News

2018’s Primary Breach Actors Were Malicious Outsiders According to a Whitepaper by security firm Tripwire, “2018’s primary breach actors were malicious outsiders. They were behind 56 percent of all breaches, followed by accidental loss at 34 per­cent, malicious insiders at 7 percent, hacktivists at 2 percent, and the remain­ing 1

Read More
Do I Need Third-Party Phishing Protection for Office 365?

Do I Need Third-Party Phishing Protection for Office 365?

Office 365’s security features won’t protect users from all cyber security threats. Microsoft’s cloud-based Office 365 user base is growing at a steady rate. Since the office platform first outperformed Google Apps in 2015, it’s seen a constant uptick in activity. Now, Microsoft reports it counts its Office 365 users in

Read More

Phishing Attack Mechanics: How Cybercrime Strategy Works

Phishing attacks follow five key steps. Effective cybersecurity prevents them at each one. “I’d never fall for that.” “It’ll never happen to me.” “They’re not interested in companies like ours.” Almost every cybercrime victim has said words like these at one time or another. Anyone who believes that they, their

Read More

The Top 5 Phishing Scams in History – What You Need to Know

Learn how to protect yourself by studying the biggest phishing scams in history If we draw an analogy between phishing and fishing, some scam artists are industrial-sized trawling operations that scrape the sea clean. Automated software and sophisticated tools make it possible for enterprising cybercriminals to scale their fraudulent emails

Read More