CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Phishing
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing

Image of hacker making shooting gesture at a laptop representing anti-hacker and phishing tips revealed by hacking the hackers
Cyber SecurityNews

Hacking the Hackers Reveals Anti-Hacker and Phishing Tips

August 22, 2017
Imperva reversed the phishing hook to hack the hackers, proving that these 'professionals' are just as susceptible – and in the process reveals some very important anti-hacker lessons.
Read More
Image of locks, keys and fishing hook on keyboard representing how businesses are victims of phishing attacks
Cyber SecurityInsights

Phishing for Data: All Businesses are Victims

September 20, 2017
Phishing attacks account for 49% of cybercrime, making them the biggest threat to your company's cyber security. Is your company and employees protected?
Read More
Image of hacker laughing representing not letting a good data breach go to waste
Cyber SecurityInsights

Never Let a Good Data Breach Go To Waste

November 22, 2017
If a massive data breach has been in the news recently – such as the Equifax data breach that impacted more than 143 million Americans – there’s a good chance that other hackers will capitalize on this public data breach to cause greater harm to victims, and open up those already victimized to even more risk.
Read More
Image of fishing hook on keyboard representing phishing attacks using free phishing kits
Cyber SecurityInsights

Phishing Attacks: Insights from More Than 1,000 Free Phishing Kits

January 10, 2018
Recent study by Imperva gets under the skin of what can now be characterized as an increasingly complex and rapidly maturing phishing industry. The study examined more than 1,000 free phishing kits that allow for the development of phishing web sites in what has been called an ‘easy to deploy’ format.
Read More
Image of confused man sitting in front of computer about to type signifying insider threats within the organization
Cyber SecurityInsights

“Real” Insider Threats Already Lurking Within Your Organization

February 28, 2018
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.
Read More
Hacker using mobile smartphone for phishing and ransomware
Cyber SecurityInsights

Cybersecurity in 2018: What You Need to Know

July 9, 2018
Cybersecurity issues in 2018 are becoming a day-to-day struggle for businesses. To keep your organization and customers secure, you will need to know the latest movements in cybersecurity.
Read More
Woman in a clown suit runs off with money showing milennials getting tricked this halloween
Cyber SecurityInsights

Why Millennials Are Likely to Get Tricked This Halloween

October 22, 2018
Millennials, a tech-savvy bunch often on the go, tend to kick caution to the curb when it comes to protecting personal information as growing up with technology often creates a false sense of security.
Read More
Man businessman in office and victim of CEO fraud
Cyber SecurityInsights

CEO Fraud and Santa Clause

January 9, 2019
Phishing attacks known as CEO Fraud or Business Email Compromise are affecting the bottom line of companies and are devastating because the spoof emails have all the appearances of being real, and the victims voluntarily hand over the money.
Read More
Hook picking up a lock showing phishing scams on computer system
Cyber SecurityResources

How to Protect Your Business from Phishing Scams

January 18, 2019
According to a recent report, 90% of all data breaches can be traced back to phishing attacks. How can businesses effectively protect themselves from this damaging cybercrime?
Read More
A fish hook with security locks representing phishing attacks
Cyber SecurityInsights

Phishing Attacks: Now More Common Than Malware

March 19, 2019
The most recent Microsoft Security Intelligence Report indicates that phishing attacks are now by far the most frequent threat to the cyber landscape, increasing a massive 250% since the previous report.
Read More
Load More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results