Remove Course Remove Phishing Remove Retail Remove Video
article thumbnail

51 Must-Know Phishing Statistics for 2023

IT Governance

Phishing is one of the most common and dangerous forms of cyber crime. Despite an array of technological solutions designed to counter phishing attacks – from antimalware software to password protections – the main weapon in anyone’s arsenal should be knowledge and awareness. How common are phishing attacks?

Phishing 111
article thumbnail

Catches of the month: Phishing scams for September 2019

IT Governance

We’re back for another round-up of phishing scams that caught our eye over the past month. This series provides real-life examples of phishing emails, helping you understand how they work and what you should do to avoid falling victim. You can check out last month’s list if you missed it. Utility providers targeted with spyware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Keep Cybersecure Over the Holidays

Adam Levin

The Covid-19 pandemic has meant increased virtual visits with loved ones, and of course remote work. Additionally, the political season gave rise to phishing campaigns, a phenomenon that is likely to continue through the end of the year. Beware of fake or misleading shopping apps.

article thumbnail

CyberheistNews Vol 12 #49 [Keep An Eye Out] Beware of New Holiday Gift Card Scams

KnowBe4

Roger covers these three scams in a short [VIDEO] and in detail on the KnowBe4 blog: You Need to Pay a Bill Using Gift Cards. Phish You for Information to Supposedly Get a Gift Card. Blog post with 2:13 [VIDEO] and links you can share with your users and family: [link]. Maliciously Modified Gift Cards in Stores. Did You Know?

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

Cybersecurity vendors, of course, have been responding. These baseline account takeovers can then be leveraged to spread spam, distribute phishing scams, launch denial of service attacks, infiltrate and plunder networks, execute wire fraud and more. Most people still tend to use the same logon credentials on multiple sites,” Link says.

Security 140
article thumbnail

2019 end-of-year review part 2: July to December

IT Governance

Among other news: The ICO began an investigation into how the TikTok video-sharing app handles children’s personal data. BEC attacks begin with a spear phishing attack sent to someone in the organisation who handles payments. This follows on from the US FTC (Federal Trade Commission) issuing TikTok a $5.7 million (£4.2

article thumbnail

How data breaches are affecting the retail industry

IT Governance

Only time will tell – and we may not have to wait long – but in the meantime, what is the impact of data breaches in the retail industry, and what needs to be done to mitigate them? This short video breaks down the numbers relating to the UK-specific cyber attacks and data breaches of 2017. million users was compromised. The PCI DSS.

Retail 66