Which malware lures work best?

“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …

Head

How attackers exploit end-users’ psychology

At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …

How cybercriminals hack our brains

Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …

The psychology of Facebook scam victims

A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged …

iCloud wasn’t hacked, says Apple

Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities. “When we learned of the theft, we were outraged and immediately …

Social Engineering Penetration Testing

We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …

The psychology of phishing

Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals no longer send out thousands of emails at random …

IT security training: Be proactive

Security is a fast paced industry. You only need to use the Internet for a short time to understand how and why the activities of digital criminals pose a real and significant …