Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
91% Of Cyberattacks Start With A Phishing Email
Newest First  |  Oldest First  |  Threaded View
helenaorstem
100%
0%
helenaorstem,
User Rank: Apprentice
9/3/2019 | 1:57:33 PM
Re: Update of stats?
I really like the dear information you offer in your articles. I'm able to bookmark your site and show the kids check out up here generally. Im fairly positive theyre likely to be informed a great deal of new stuff here than anyone. In addition, how should we take our security measures in 2020?
PhishProtection
50%
50%
PhishProtection,
User Rank: Apprentice
6/19/2019 | 10:58:18 PM
Update of stats?
Is there an update of these stats available? we're trying to get a feed of all live phishnig threats as they happen in 2019 over at phishprotection.com There's a ton of new malware, phishing schemes, ransomware etc since this report so an updated cyber security report would be nice to have.
ludovic_rembert
100%
0%
ludovic_rembert,
User Rank: Apprentice
4/21/2019 | 9:18:23 AM
Lack of secure email is the problem
The study is alarming... and when you consider that many folks around the world still aren't fully "plugged in" to email (yet), the rate of phisphing will only increase. A similar study from the FTC found that phisphing increased by 2,370% between 2015 and 2016. At that rate, it's easy to throw our collective hands up and think, why bother pursuing this? The truth is, that all of us writing this and reading this article most likely have at least a rudimentary grasp on spotting scams and email best practices. Unfortunately, it's usually the poor and downtrodden who tend to fall victim to phisphing scams, "hoping" for some better way out of a bad situation. The issue is that hundreds of millions of users forego secure/encrypted email platforms, such as Tutanota or any of these others. Instead, they gravitate towards a few ESPs like Outlook/Live (which was recently breached), Gmail (which has privacy concerns), and Yahoo!/Hotmail (do people still use these?). 
nelly.bs
0%
100%
nelly.bs,
User Rank: Guru
2/27/2019 | 5:28:05 PM
Re: Great!
We don't really know why insurance was the leading vertical

clipart png 2019 calendar printable calendar pikstagram apk download apk android apk
Ritu_G
100%
0%
Ritu_G,
User Rank: Moderator
8/19/2018 | 10:53:16 PM
Re: Great!
This is the exact reason why internet users need to be on their guards at all times. Do not be so naïve and believe everything they see or read on the internet. Prevention is always better than cure and once you have gotten hit, most often than not, there is no turning back. Whatever you read on the internet that is too good to be true, it usually is. Hence, do not fall for anything that may look a little less convincing.
goldhand
50%
50%
goldhand,
User Rank: Apprentice
2/19/2018 | 6:12:16 AM
Great!
I really like the dear information you offer in your articles. I'm able to bookmark your site and show the kids check out up here generally. Im fairly positive theyre likely to be informed a great deal of new stuff here than anyone.

slope
davburnett
0%
100%
davburnett,
User Rank: Apprentice
9/25/2017 | 6:08:27 AM
Re: Hmm Phishy
What's most concerning is the number of CISO's and IT people in a position of responsibility that believe training/human awareness is the answer to protecting against phishing attacks.
Row3n
50%
50%
Row3n,
User Rank: Strategist
12/14/2016 | 10:16:38 PM
Re: Hmm Phishy
You would think that by now that people would have the sense to see these "congratulations you've won a million dollars" emails and know better! I mean, of course hackers are getting more and more sophisticated, but a great number of these crazy spam emails are obvious as heck that that's precisely what they are!
hxrrison
100%
0%
hxrrison,
User Rank: Apprentice
12/13/2016 | 11:24:31 AM
Hmm Phishy
Phishing threat is reduced when phishing drills are run. Funny that a company that does that exact thing would come up with that solution.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11655
PUBLISHED: 2020-04-09
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
CVE-2020-11656
PUBLISHED: 2020-04-09
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
CVE-2019-20637
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connecti...
CVE-2020-11650
PUBLISHED: 2020-04-08
An issue was discovered in iXsystems FreeNAS 11.2 and 11.3 before 11.3-U1. It allows a denial of service.
CVE-2020-11653
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.