You Searched For "phishing examples" and got 15 results
Sort By:
Top ten phishing tricks that companies are using to test their employees’ cybersecurity smarts
Cyberthreats have grown exponentially as people work from home during the coronavirus pandemic. Mor…
Prabhjote Gill
What is phishing attack and what are the examples of phishing attacks
The advisory has been issued by Indian Computer Emergency Response Team (CERT-In), which is Indi…
How businesses can use escape rooms, phishing tests, and other creative tactics to fend off common cyberattacks, according to experts from Mastercard and the US government
Mastercard's Jon Brickey and the Department of Education's Steven Hernandez explain how companies c…
Jacob E. Robbins
Cyberattacks still threaten home networks, two years after the COVID-19 pandemic spurred the work-from-home boom
Organizations have been wrestling with WFH cybersecurity issues for more than two years, but cybera…
Stephen Lawton
What is spoofing? Understanding the type of cyber attack and how you can protect yourself against it
Spoofing is a cyber attack that involves a bad actor disguising their identity as one from a name o…
Ryan Ariano
India among top three countries facing phishing attacks via WhatsApp and Telegram, reveals report
India is among the top three countries facing phishing attacks primarily via instant mobile messagi…
Nearly 500 Google users in India were warned of phishing attacks by governments— the number is as high as 12,000 worldwide
If you have received a warning from Google about a possible phishing attack, go back and check agai…
What is phishing? Here's what you should know about the virtual scamming technique and how to protect yourself from data theft
Phishing is a form of cybercrime wherein emails from fake senders request your personal info. Here'…
Dave Johnson
Scammers are sending fake texts about FedEx and USPS packages, and it's fueling a conspiracy theory about a sex trafficking scandal
Despite social media claims, there's no evidence the texts, which appear to be from businesses like…
Mary Meisenzahl
Chinese hackers are using backdoors to gain unrestricted access to companies and governments — and it’s not about the money
The digital security companies’, Avast and ESET, found that an advanced persistent threat (APT) a…
Ransomware attack puts Priyanka Chopra, Lady Gaga, Madonna and other celebrities’ data at risk — and REvil hackers are known to follow through on their threats
“REVil, also known as Sodin or Sodinokibi, isn’t just operating on the old-school ransomware mod…
Nobel laureate Paul Krugman said he likely fell for a phishing scam. Here's how phishing scams work and how to avoid them.
The incident appears to be an example of a phishing scam, in which scammers pose as an authority or…
Aaron Holmes
Scammers used fake emails and a cloned website to trick health authorities into spending millions on face masks that didn't exist
The episode illustrates how scammers are cashing in on government agencies' desperation and need fo…
Aaron Holmes
Think you can spot a hacker's phishing email? Take Google's quiz and find out
This is why Google and Jigsaw - a security-focused tech incubator owned by Alphabet, Google's paren…
Paige Leskin
None of Google's 85,000 employees have been successfully phished in over a year - and it's because of a simple $20 product anyone can use
Unsuspecting people click on the link in the phishing email and it leads them to a site specially d…