What is Pretexting? Types, Examples, & Prevention
Pretexting attacks come in all kinds of shapes and sizes. Read this blog to familiarize yourself with the threat so you can keep members of your organization safe.
Pretexting attacks come in all kinds of shapes and sizes. Read this blog to familiarize yourself with the threat so you can keep members of your organization safe.
Hacks, social engineering, and phishing dominated this week’s headlines, but cloud security is at the forefront of government officials’ minds. Catch up on all the latest in this week’s Friday Five!
Verizon's latest Data Breach Investigations Report (DBIR) was released this past week, but it shared the headlines with malware attacking Minecraft users, an FBI alert of rising sextortion attacks, and more. Catch up on all these stories and more in this week’s Friday Five!
SIM swap scams are on the rise--here's everything you need to know about them and how you can prevent them from happening to you.
34 infosec experts discuss how to prevent the most common social engineering attacks.
The FBI is again warning organizations of increased voice phishing - vishing - attacks targeting teleworkers.
Facebook this week said it removed a series of pages believed to be involved in a deceptive political influence campaign.
Phishing emails that impersonate the CEOs of targeted businesses are on the rise and highly effective, according to a new warning from the FBI.
With just two weeks left before the U.S. tax filing deadline, tax fraud is in full swing.
As social engineering attacks continue to grow in sophistication and frequency, companies should look to employee education as a first line of defense. Learn how to recognize and avoid social engineering attacks in this installment of our Data Protection 101 series.