Resolutions' Cloud Antivirus Security was designed from the ground up to be a modular security product. It goes far beyond typical...
Showing results 1 to 20 of 67
Symantec has explored the realm of phishing kits and how they can be used to conduct professional-looking campaigns against unsuspecting victims.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
ThreatData essentially pools data related to malware, phishing, and other online risks across the Internet for both real-time and long-term analysis.
Trojan "most sophisticated cyber weapon" in market currently, but Verizon exec reckons its large file size and non-network-propagating nature means malware won't pose much of a threat globally.
Banks in India regularly send their customers e-mail messages about phishing and vishing scams--how not to reveal your Web identity and personal data and fall prey to fraudulent e-mail. But at the same time, they regularly peep into the bank accounts of its customers in the name of customer relationship.
Authenticates mail from Message Level Network users, Mail Reputation provided by Sender Score for each message and Anti-Phishing Data...
update Consumerization of IT, and increase and improvement of Web malware are latest trends that will open doors to cybercriminals, user education needed for mitigation, market watcher states.
China boosting information warfare capabilities, with help of academia and commercial IT sector, posing risk to Western government and firms, report alleges.
Delphish is a free extension for MS Outlook / Outlook Express which assists you in detecting Phishing attacks. It's absolutely free...
Transaction-signing tokens help mitigate emerging social engineering attacks, observers say, with one adding that banks should continue investing in security systems refresh.
Stolen details mostly from U.K. and France and likely used to spread reach of malware, says security vendor. It adds Ramnit represents new breed of social network worms.
Researchers design computer programs mimicking humans to infiltrate Facebook and steal user data, and warn that these socialbots can be use for identity theft.
Researchers have discovered what they say is a design flaw in Android that could be used by criminals to steal data via phishing or by advertisers to bring annoying pop-up ads to phones.
Phishers are using Google-hosted spreadsheets in identity-stealing social engineering attacks, according to security firm F-Secure
Symantec exec urges comprehensive monitoring to better detect malicious activity, as new report reveals 2010 as the year of targeted attacks with security headliners such as Stuxnet.
E-mail vigilance and multi-layer defense can ward off spear-phishing and advanced persistent threats, say security experts, who believe recent RSA breach is a one-off.
The memory company has warned customers not to respond to requests for credit card numbers in scam emails, after the Epsilon data breach
Financial institutions such as Standard Chartered and OCBC Bank increasingly rely on improved online and mobile banking services to foster customer "stickiness" and lower operational costs.
Crooks already using cloud services as platform for illegal activities, warn security players, who say service providers have role to play in preventing their services from being abused.
Hacker masquerading as fast food chain steals thousands of customer details, including names, phone numbers, e-mail and street addresses.
McDonalds' has lost thousands of customer details including names, phone numbers and street and email addresses to a hacker and is warning of pending phishing scams.
While a lower market share has kept Apple users safe from attacks, security firms warn that with increasing Mac malware codes, a major incident is "waiting to happen".