CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Phishing
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing

Image of hacker making shooting gesture at a laptop representing anti-hacker and phishing tips revealed by hacking the hackers
Cyber SecurityNews

Hacking the Hackers Reveals Anti-Hacker and Phishing Tips

August 22, 2017
Imperva reversed the phishing hook to hack the hackers, proving that these 'professionals' are just as susceptible – and in the process reveals some very important anti-hacker lessons. Read More
Image of locks, keys and fishing hook on keyboard representing how businesses are victims of phishing attacks
Cyber SecurityInsights

Phishing for Data: All Businesses are Victims

September 20, 2017
Phishing attacks account for 49% of cybercrime, making them the biggest threat to your company's cyber security. Is your company and employees protected? Read More
Image of hacker laughing representing not letting a good data breach go to waste
Cyber SecurityInsights

Never Let a Good Data Breach Go To Waste

November 22, 2017
If a massive data breach has been in the news recently – such as the Equifax data breach that impacted more than 143 million Americans – there’s a good chance that other hackers will capitalize on this public data breach to cause greater harm to victims, and open up those already victimized to even more risk. Read More
Image of fishing hook on keyboard representing phishing attacks using free phishing kits
Cyber SecurityInsights

Phishing Attacks: Insights from More Than 1,000 Free Phishing Kits

January 10, 2018
Recent study by Imperva gets under the skin of what can now be characterized as an increasingly complex and rapidly maturing phishing industry. The study examined more than 1,000 free phishing kits that allow for the development of phishing web sites in what has been called an ‘easy to deploy’ format. Read More
Image of confused man sitting in front of computer about to type signifying insider threats within the organization
Cyber SecurityInsights

“Real” Insider Threats Already Lurking Within Your Organization

February 28, 2018
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks. Read More
Hacker using mobile smartphone for phishing and ransomware
Cyber SecurityInsights

Cybersecurity in 2018: What You Need to Know

July 9, 2018
Cybersecurity issues in 2018 are becoming a day-to-day struggle for businesses. To keep your organization and customers secure, you will need to know the latest movements in cybersecurity. Read More
Woman in a clown suit runs off with money showing milennials getting tricked this halloween
Cyber SecurityInsights

Why Millennials Are Likely to Get Tricked This Halloween

October 22, 2018
Millennials, a tech-savvy bunch often on the go, tend to kick caution to the curb when it comes to protecting personal information as growing up with technology often creates a false sense of security. Read More
Man businessman in office and victim of CEO fraud
Cyber SecurityInsights

CEO Fraud and Santa Clause

January 9, 2019
Phishing attacks known as CEO Fraud or Business Email Compromise are affecting the bottom line of companies and are devastating because the spoof emails have all the appearances of being real, and the victims voluntarily hand over the money. Read More
Hook picking up a lock showing phishing scams on computer system
Cyber SecurityResources

How to Protect Your Business from Phishing Scams

January 18, 2019
According to a recent report, 90% of all data breaches can be traced back to phishing attacks. How can businesses effectively protect themselves from this damaging cybercrime? Read More
A fish hook with security locks representing phishing attacks
Cyber SecurityInsights

Phishing Attacks: Now More Common Than Malware

March 19, 2019
The most recent Microsoft Security Intelligence Report indicates that phishing attacks are now by far the most frequent threat to the cyber landscape, increasing a massive 250% since the previous report. Read More
Load More

Latest

Clubhouse application on mobile phone screen showing threat of data scraping

Clubhouse Joins Facebook and LinkedIn as Target of Data Scraping; Cumulative One Billion User Profiles Have Been Leaked

Three men in bar with smartphones in hands showing challenges with DevSecOps

Developers, Security and Operations Walk into a Bar…

SAP system on virtual screen showing cyber attack on security vulnerabilities

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Engineer checking intelligent factory showing state of IoT security

New Tripwire Survey: IoT Security Still in Shambles, Most Security Pros Struggling To Make Devices Fit Safely Into Business Networks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results