Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
NSS Labs compared IE, Firefox, Chrome and Safari's protection against phishing and socially engineered malware attacks.
Saboteurs have included HMTL injection scripts in the trojan, which shows fake web pages in various languages depending on the victims' location.
A worm known for propagating through social media channels is back, according to security firm McAfee.
GoDaddy admitted that an employee was social engineered into giving up information that resulted in Naoki Hiroshima being extorted for his rare Twitter username.
Experts shared how organizations can identify saboteurs by interpreting physical cues or nonverbal communication.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.
Threats from inside an organization - and from third-parties - pose a burgeoning challenge for security professionals, reports Jim Romeo.