phishing

phishing news search results

Developer news items we found relating to phishing

30 results
PhishFlagger-anti-phishing-email-solution-released

PhishFlagger anti-phishing email solution released


Monday, August 19, 2024 by

PhishFlagger, a human-compatible patented phishing solution, recently announced its new patented anti-phishing email solution. The solution validates emails through a unique identifier protocol, PhishCounter, which adds a sequential number in the subject line that identifies all outgoing and inbound emails. The easily implemented system also allows recipients to identif...


Tom-Brady-NFT-sale-sparks-warning-to-consumers-from-experts

Tom Brady NFT sale sparks warning to consumers from experts


Wednesday, February 28, 2024 by

An expert has warned those considering purchasing an NFT off the back of the Tom Brady $40.7k sale, as NFT marketplaces saw $38 million stolen by scammers last year. The findings, pulled together by Smart Betting Guide, analyzed a database recording crypto scams and exploits to identify the most vulnerable platforms and blockchains over the last year - with NFT marke...


AI-cybersecurity-impacts-according-to-NetLib-Security

AI cybersecurity impacts according to NetLib Security


Monday, December 18, 2023 by

This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side. 2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...


ImmuniWeb-Neuron-web-security-scanning

ImmuniWeb Neuron web security scanning


Friday, June 10, 2022 by

ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available. ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...


Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


Cyvatar-raises-9-million-for-cybersecurity-as-a-service-model

Cyvatar raises 9 million for cybersecurity as a service model


Monday, June 21, 2021 by

Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model. Cyvatar raises 9 million for cybersecurity as a service model Escalating cybersecurity breaches and the need to addr...


How-to-avoid-mobile-phone-apps-from-leaking-your-personal-data

How to avoid mobile phone apps from leaking your personal data


Wednesday, November 18, 2020 by

Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...


Match.com-gets-sued-by-FTC-for-using-fake-love-interest-ads

Match.com gets sued by FTC for using fake love interest ads


Thursday, September 26, 2019 by

This just in from the FTC. The Federal Trade Commission has sued online dating service Match Group, Inc. (Match), the owner of Match.com, Tinder, OkCupid, PlentyOfFish, and other dating sites, alleging that the company used fake love interest advertisements to trick hundreds of thousands of consumers into purchasing paid subscriptions on Match.com. The agency also al...


A-world-with-no-passwords-and-how-FIDO2-can-help-make-it-happen

A world with no passwords and how FIDO2 can help make it happen


Monday, May 13, 2019 by

93.2 percent of the overall web browser market has embraced FIDO2: Google Chrome, Microsoft Edge, Apple Safari, Mozilla Firefox, and Opera. The FIDO Alliance is driven by hundreds of global tech leaders across enterprise, payments, telecom, government, and healthcare that have come together in support of the organization’s mission to reduce the world’s re...


Finding-website-risk-levels-and-reputations-gets-easier-for-IT-admins

Finding website risk levels and reputations gets easier for IT admins


Monday, May 13, 2019 by

NetMotion Software announced NetMotion Reputation, a subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains. Reputation allows IT teams to get visibility into user behavior, including a better understanding of access to risky or inappropriate cloud applications and websites. Customers can also block access if an...


Videoselfie-authentication-tool-launches

Videoselfie authentication tool launches


Tuesday, February 19, 2019 by

Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


30,000-blacklisted-apps-hosted-on-the-Google-Play-Store-report-finds

30,000 blacklisted apps hosted on the Google Play Store report finds


Friday, September 21, 2018 by

RiskIQ has released its Mobile Threat Landscape Q2 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings show a spike in blacklisted apps headlined by Trojans and Adware, as well as a fascinating shift in tactics by mobile threat actors. For the second year in a row, RiskIQ observed a sharp increase in black...


Fortnite-for-Android-is-a-trailblazing-risk-for-mobile-banking

Fortnite for Android is a trailblazing risk for mobile banking


Tuesday, August 14, 2018 by

CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” - not to mention side-step Google’s 30% take of developer proceeds - by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the statu...


ICO-investment-guide-to-review-before-you-leap

ICO investment guide to review before you leap


Wednesday, February 21, 2018 by

When reviewing a new cryptocurrency project or vendor, there is a certain amount of due diligence required. The crypto space is notorious for an abundance of charlatans, phishers and scammers which seem to only get more sophisticated and verisimilar by the day. Here is a quick checklist to run through when approaching or being approached by a party or project in crypto....


Using-common-short-codes-for-mobile-app-marketing

Using common short codes for mobile app marketing


Friday, February 16, 2018 by

App developers know well the difficulties in marketing their apps. But a highly compelling way to advertise their apps in the context to the real world is being overlooked.Common Short Codes provide an easy way for app developers and brands to get consumers to download an app in context with their current, real-world surroundings. Common Short Codes bring integrity and ...


SlashNext-launches-AI-internet-threat-protection-system-

SlashNext launches AI internet threat protection system


Thursday, November 9, 2017 by

SlashNext announced the company’s broad market release of the SlashNext Internet Access Protection System to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The system goes beyond first generation signature-based and second generation sandbox-based technologies and deploys artificial intelligence and cog...


New-biometric-authentication-could-be-a-password-killer

New biometric authentication could be a password killer


Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...


Enterprise-threat-dubbed-HospitalGown-infests-thousands-of-apps

Enterprise threat dubbed HospitalGown infests thousands of apps


Tuesday, June 6, 2017 by

Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...


Ways-you-can-protect-yourself-on-the-Internet

Ways you can protect yourself on the Internet


Thursday, February 23, 2017 by

Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


Bitdefender-releases-IoT-security-device-at-CES-2017

Bitdefender releases IoT security device at CES 2017


Saturday, January 7, 2017 by

Bitdefender BOX helps with smart device hacking that threatens our new way of being connected with IoT.Bitdefender, a cybersecurity solutions provider, unveils at CES in Las Vegas the next-generation of Bitdefender BOX, the device turning the table on cyber-criminals and revolutionizing the way people protect themselves from malware, hackers, ransomware, phishing and ot...


Ransomware-facts-and-the-steps-to-prevent-it-on-your-device

Ransomware facts and the steps to prevent it on your device


Friday, December 30, 2016 by

As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...


IBM-Security-Channels-Its-Inner-XMen-with-Launch-of-IBM-XForce-Red-Security-Division

IBM Security Channels Its Inner XMen with Launch of IBM XForce Red Security Division


Friday, August 5, 2016 by

Someone in charge of naming divisions at IBM must have been a big Sci-Fi fan as is evidenced with IBM Security’s name for the a news security task force - IBM X-Force Red. Yep, that’s the name for a new group of IBM security professionals and ethical hackers whose goal is to help businesses discover vulnerabilities in their computer networks, hardware, and software...


How-Frightened-Should-Android-Developers-Be-Of-Stagefright

How Frightened Should Android Developers Be Of Stagefright


Wednesday, July 29, 2015 by

Stagefright is a new Android vulnerability which was found and announced by Joshua J. Drake, Zimperium zLabs Vice President of Platform Research and Exploitation. Specifically the company says Stagefright is: “…what we believe to be the worst Android vulnerabilities discovered to date.”Here is a rundown according to Zimperium, “These issues in Stagefright code criticall...


Google-Offers-Up-to-$30k-Bounties-for-Discovering-Android-Vulnerabilities

Google Offers Up to $30k Bounties for Discovering Android Vulnerabilities


Friday, June 19, 2015 by

Google has announced a new Android Security Rewards program to encourage the Android developer community to discover vulnerabilities and disclose them to the Android Security Team. The reward level is based on the bug severity and payments are elevated for high quality reports that include reproduction code, test cases, and patches.The program covers security vulnerabil...


An-Analysis-of-the-Starbucks-Cyber-Attack-and-How-To-Stay-Protected

An Analysis of the Starbucks Cyber Attack and How To Stay Protected


Wednesday, June 10, 2015 by

How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement  denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...


OpenDNS-Releases-Enforcement-API-for-Threat-Prevention

OpenDNS Releases Enforcement API for Threat Prevention


Tuesday, May 19, 2015 by

OpenDNS has announced the availability of its enforcement API, which automatically turns threat intelligence generated by an enterprise’s security and incident response teams into threat prevention, providing real-time protection for users and devices. The company also announced two new partnerships with threat intelligence platform providers ThreatConnect and Thre...


Next-Generation-Email-Management-Platform-Unveiled-By-Vade-Retro

Next Generation Email Management Platform Unveiled By Vade Retro


Thursday, November 27, 2014 by

Vade Retro, a European based graymail management company recently launched the world's first Graymail Management platform in the United States. The next-generation email management platform was developed to filter out Graymail in the US. Graymail is an email which the user might have subscribed to and does not want to receive further messages. Email has become a to...


KeyLemon-Launches-Cloud-based-Face-and-Speaker-Recognition-APIs-for-Development

KeyLemon Launches Cloud based Face and Speaker Recognition APIs for Development


Tuesday, October 21, 2014 by

KeyLemon, a creator of biometric ID and motion analysis technologies, has released access to its security recognition via a web service. KeyLemon’s biometric ID provides an alternative to passcodes, key fobs or secret information to facilitate authentication and access control for online assets. Through its Okta Application Network (OAN), Okta provides the ability for u...