You Searched For "phishing attack example" and got 18 results
Sort By:
Top ten phishing tricks that companies are using to test their employees’ cybersecurity smarts
Cyberthreats have grown exponentially as people work from home during the coronavirus pandemic. Mor…
Prabhjote Gill
What is phishing attack and what are the examples of phishing attacks
The advisory has been issued by Indian Computer Emergency Response Team (CERT-In), which is Indi…
How businesses can use escape rooms, phishing tests, and other creative tactics to fend off common cyberattacks, according to experts from Mastercard and the US government
Mastercard's Jon Brickey and the Department of Education's Steven Hernandez explain how companies c…
Jacob E. Robbins
What is spoofing? Understanding the type of cyber attack and how you can protect yourself against it
Spoofing is a cyber attack that involves a bad actor disguising their identity as one from a name o…
Ryan Ariano
Chinese hackers are using backdoors to gain unrestricted access to companies and governments — and it’s not about the money
The digital security companies’, Avast and ESET, found that an advanced persistent threat (APT) a…
India among top three countries facing phishing attacks via WhatsApp and Telegram, reveals report
India is among the top three countries facing phishing attacks primarily via instant mobile messagi…
Nearly 500 Google users in India were warned of phishing attacks by governments— the number is as high as 12,000 worldwide
If you have received a warning from Google about a possible phishing attack, go back and check agai…
Ransomware attack puts Priyanka Chopra, Lady Gaga, Madonna and other celebrities’ data at risk — and REvil hackers are known to follow through on their threats
“REVil, also known as Sodin or Sodinokibi, isn’t just operating on the old-school ransomware mod…
Cyberattacks still threaten home networks, two years after the COVID-19 pandemic spurred the work-from-home boom
Organizations have been wrestling with WFH cybersecurity issues for more than two years, but cybera…
Stephen Lawton
What is phishing? Here's what you should know about the virtual scamming technique and how to protect yourself from data theft
Phishing is a form of cybercrime wherein emails from fake senders request your personal info. Here'…
Dave Johnson
The cost of ransomware attacks has more than doubled. Here's how companies can prevent and plan for these attacks, according to experts
Biden-Harris campaign cybersecurity staffer Jackie Singh and data privacy expert Debbie Reynolds ex…
Rosalie Chan
Scammers used fake emails and a cloned website to trick health authorities into spending millions on face masks that didn't exist
The episode illustrates how scammers are cashing in on government agencies' desperation and need fo…
Aaron Holmes
How tackling cybersecurity training from a companywide lens leads to better preparedness
Cybersecurity experts recommend a hybrid approach when training for cyberattacks, including company…
Stephen Lawton
What is a cyberattack? A guide to the different methods cybercriminals use to harm computers and steal data
A cyberattack is an assault on any computer or network, almost always launched from another compute…
Dave Johnson
Think you can spot a hacker's phishing email? Take Google's quiz and find out
This is why Google and Jigsaw - a security-focused tech incubator owned by Alphabet, Google's paren…
Paige Leskin
Ransomware can encrypt your files and force you to pay money — here's how to avoid ransomware, or deal with an infection
Ransomware is a kind of malware that can lock you out of all of the files on your computer unless y…
Dave Johnson
Cyber security risk increases as millions of Indians work from home
Deepak Bhawnani, CEO at Alea Consulting said: "Companies, large and small, will be impacted due …
Uber warns cyber attacks could cripple its business
In 2017, for example, Uber paid hackers $100,00 to cover up a 2016 cyber attack that exposed the pe…