In 2016, American businesses suffered half a billion dollars a year in losses from phishing attacks with the average cost at $1.6 million each. These numbers are alarming evidence that just one click can cause significant financial and reputational damage to your brand. And since studies show that a staggering 30 percent of phishing emails get opened, it’s no wonder that they consistently rank as the top cyberattack vector.
Despite being one of the oldest cyberattacks in the book, phishing remains so popular because it’s a highly effective means of exploiting the weakest link in the cybersecurity chain: humans. To make matters worse, hackers have become much more sophisticated in their techniques: no more poorly written, typo-ridden Viagra spam emails and unclaimed heritage scams. Phishing attacks are now highly targeted, dynamic and "hypermorphic," making them increasingly difficult for both humans and machines to detect.
PHP powers the vast majority of the web today. It is by far the most ubiquitous and accessible mature web language, and welcomes thousands of new developers every day.
Better PHP Development offers the tools and techniques you need to become a better developer.
Most Commented Stories
Microsoft blocks the rollout of Windows 10 April 2018 Update to computers with problematic Intel SSDs
The Special Olympics is a wonderful organization that enables people with intellectual disabilities to compete against each other and win medals. While it promotes health, fitness, and camaraderie, it also highlights that all people deserve the right to compete. It is very inspiring stuff, folks.
Today, Microsoft announces that it has partnered with the Special Olympics for an all-new Xbox gaming tournament. This is not the first time that the Windows-maker has worked with the organization. For this tourney, Microsoft is pairing two players to a team -- one with an intellectual disability and one without. Teams will then face-off by playing Forza Motorsport 7 -- a racing game published by Microsoft Studios.
Technology progresses quickly. In large part, that’s due to semiconductors, which power everything from computers to toasters.
As semiconducting components become more advanced, they get smaller and more powerful. This, in turn, enables electronic products to become smaller, more powerful and more cost-effective. One company, which has long been a leader in the semiconductor business, recently introduced a unique machine that takes microprocessor production to the next level.
Trend Micro has a new privacy-focused mobile browser for iOS users called Zero Browser. It has been designed specifically to block a range of tracking techniques, including the invasive activity-recording "session replay" method.
The company says that the browser was created to overcome the shortcomings of existing "incognito" browsing modes and brings an extra level of privacy to iPhone, iPad and iPod touch users.
The clock is ticking for the arrival of GDPR (or General Data Protection Regulation) in Europe. As of May 25 -- this Friday -- new regulations will give people greater access to the data companies store about them and the right to have it deleted.
Microsoft is among the global technology firms that will have to comply with the laws in Europe and -- pointing out how it appreciates "the strong leadership by the European Union on these important issues" -- the company says that it will also roll out some of the benefits of the privacy legislation on a global basis. It will be known as Data Subject Rights.
Robbing a bank used to involve a mask, a gun and a fast car, but these days it's more likely to be done via the safer and no less lucrative means of a cyberattack.
A new report from cloud security specialist Carbon Black, based on responses from CISOs at 40 major financial institutions -- including six of the top 10 global banks -- seeks to better understand the attack landscape.
With GDPR coming into force at the end of this week, new research from Egress Software Technologies found over half of respondents were in the dark about what their company was doing to prepare for the legislation.
Only 43 percent of the 1,000 respondents were aware of preparations, there is also a lack of awareness surrounding personal data in general. One in 10 are unaware they are handling personal data in their day-to-day jobs and 57 percent are unable to correctly identify when it would need to be protected.
Not so long ago the idea of email fraud mainly involved Nigerian princes asking for your help to liberate a few million dollars.
Things have moved on and the scammers have become more sophisticated, but email fraud is no less of a threat according to a new study by email security specialist Agari, which studied activity on 78 criminal email accounts over a period of 10 months.
Security researchers have discovered a bug in the Comcast website that makes it possible to gather information about Xfinity users. As well as customer data such as home addresses, it is also possible to access wireless network details including passwords.
The bug was reported by Karan Saini and Ryan Stevenson after they found it was possible to use the Xfinity activation website to access customer data using nothing more than a customer account ID and that customer's house or apartment number.
It's only a couple of week until Apple's Worldwide Developer Conference, and it's looking as though we could be getting a new voice for Siri -- and possibly a new HomePod.
This is not just idle speculation or the usual industry rumor mill working overtime -- this time around it is Siri itself providing the clues. Ask Siri what to expect from WWDC next month, and the digital assistant starts to drop hints.
As news of yet another chip vulnerability creeps out, computer users, businesses and organizations around the world are trying to assess how the latest bug affects them. To help its users and others to understand what the Speculative Store Bypass/Variant 4 vulnerability means, Red Hat has issued advisories and an explanatory video.
The company also reveals exactly which of its Linux builds are affected by the security flaw and what steps can be taken as mitigation. In addition to this, Red Hat has put together a number of resources that help to "provide more context around this vulnerability from an open source technology perspective".
Spectre and Meltdown variant 4: Microsoft, Google and Intel reveal new Speculative Store Bypass chip vulnerability
Just when you thought you could forget about the Spectre and Meltdown chip vulnerabilities, yet another variant has been discovered. Known as Speculative Store Bypass, the vulnerability affects chips from AMD and Intel, as well as Power 8, Power 9 and System z processors.
Amazon's Prime Exclusive Phone program is one of the best deals going. If you aren't familiar, this is where quality Android devices are sold at discounted prices to Amazon Prime members. The company used to subsidize the price by showing advertisements on the phone's lock screen, but it has since abandoned that. Instead, the phone is ad-free, but does come with some Amazon apps preinstalled.
Today, Amazon launches the latest Prime Exclusive Phone. The LG K30, as it is called, is your run-of-the-mill Android device, with ho-hum specifications and a generic design. What makes it truly enticing, however, is the price -- a mere $139.99. This is a massive $40 discount off the normal price of $179.99. Wow!
Want to know a secret? Google apps on iOS are often much better than the Android versions. Don't ask me why -- you'd think the search giant would show more love to its own platform instead of Apple's, but oh well. Ultimately, iPhone owners get the best of both worlds.
Today, Google announces a new Maps feature that is apparently exclusive to iOS. Before Android users get too upset, they should know it really isn't a big deal. In fact, it is kind of odd that the search giant is even hyping the seemingly useless feature. What is it, you ask? Well, on Google Maps for iOS, you can now replace the usual blue arrow that represents your vehicle with an icon of a car, truck, or SUV. Umm, OK...