When it comes to phishing, fraudsters use timing, trends, and technical modifications to make their phishing attacks work better, says Limor Kessem, global executive security advisor, cyber security researcher, IBM Security. “We can see seasonal trends with phishing, mostly around tax time and the holiday season, but phishers prey on users whenever a popular subject arises, … [Read more...] about So long, and thanks for all the phish part 2
Intelligent Phishing Defense
2020: A look ahead to a rash of phishing attacks
As we head toward 2020 we can expect to see a variety of situations-based phishing attacks. While there will always be attacks based on major events, such as the Super Bowl, Academy Awards, births and deaths relating to celebrities, and the like, there are other big milestones coming up. Here are but a few: China’s third space station is expected to launchUS presidential … [Read more...] about 2020: A look ahead to a rash of phishing attacks
So long, and thanks for all the phish part 1
There is an axiom that says, “Give a man a fish he eats for a day; teach a man to fish and he can feed himself forever.” Cybercriminals have co-opted that to say “Give a man a fish and he eats for a day, teach a man to phish and he’ll live like a king.” Phishing is the bane of CISOs everywhere. There is nary an organization these days that has not been on the receiving end … [Read more...] about So long, and thanks for all the phish part 1
Infographic: How to spot a phish
Uncomfortable truth #5 about phishing defense
Last in a 5-part series. In this blog series we’ve explored the Uncomfortable Truths about phishing defense that relate to the problem of over-relying on technology to keep us safe. We’ve also seen how empowered users can give Security Operations teams desperately needed visibility into phishing threats. This leads us to our fifth and final Uncomfortable Truth: … [Read more...] about Uncomfortable truth #5 about phishing defense