Mobile Phishing Protection
The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
DoH and Phishing Risks. What You Need to Know Now
As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data is collected and sold without our knowledge and consent, it has made ...
Phishing 2.0 is Here — Make Sure You’re Prepared
Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threat vectors, such as SMS, social media, browser extensions to attack through actions such as credential stealing, rogue software, ...
Twitter Hack—Old Dog, New Tricks
The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of phishing sites each day because cybercriminals see it as an easy way to ...
Mobile Phishing, the Next Battleground
With the rising popularity of iOS and Android devices for everything from sending a client an SMS to attending a Zoom call, it was only a matter of time before cybercriminals seized ...
Going Beyond Awareness Training to Protect Mobile Devices from Phishing
According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in this way: ...
Rethinking Endpoint and Mobile Security for Remote Workers
With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT security teams to rethink their endpoint security strategies. VPN tunneling enables remote ...