article thumbnail

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. million potential victims of phishing kits; and 1.9 Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

article thumbnail

What did you do for European Cyber Security Month?

IT Governance

Likewise, we explained the after-effects of a data breach , and continued our monthly review of phishing scams and of the latest data breaches and cyber attacks. IT Governance regularly publishes webinars and green papers , providing free advice delivered by experts. Security Summit North. All the latest cyber security news and advice.