Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
91% Of Cyberattacks Start With A Phishing Email
Oldest First  |  Newest First  |  Threaded View
hxrrison
100%
0%
hxrrison,
User Rank: Apprentice
12/13/2016 | 11:24:31 AM
Hmm Phishy
Phishing threat is reduced when phishing drills are run. Funny that a company that does that exact thing would come up with that solution.
Row3n
50%
50%
Row3n,
User Rank: Strategist
12/14/2016 | 10:16:38 PM
Re: Hmm Phishy
You would think that by now that people would have the sense to see these "congratulations you've won a million dollars" emails and know better! I mean, of course hackers are getting more and more sophisticated, but a great number of these crazy spam emails are obvious as heck that that's precisely what they are!
davburnett
0%
100%
davburnett,
User Rank: Apprentice
9/25/2017 | 6:08:27 AM
Re: Hmm Phishy
What's most concerning is the number of CISO's and IT people in a position of responsibility that believe training/human awareness is the answer to protecting against phishing attacks.
goldhand
50%
50%
goldhand,
User Rank: Apprentice
2/19/2018 | 6:12:16 AM
Great!
I really like the dear information you offer in your articles. I'm able to bookmark your site and show the kids check out up here generally. Im fairly positive theyre likely to be informed a great deal of new stuff here than anyone.

slope
Ritu_G
100%
0%
Ritu_G,
User Rank: Moderator
8/19/2018 | 10:53:16 PM
Re: Great!
This is the exact reason why internet users need to be on their guards at all times. Do not be so naïve and believe everything they see or read on the internet. Prevention is always better than cure and once you have gotten hit, most often than not, there is no turning back. Whatever you read on the internet that is too good to be true, it usually is. Hence, do not fall for anything that may look a little less convincing.
nelly.bs
0%
100%
nelly.bs,
User Rank: Guru
2/27/2019 | 5:28:05 PM
Re: Great!
We don't really know why insurance was the leading vertical

clipart png 2019 calendar printable calendar pikstagram apk download apk android apk
ludovic_rembert
100%
0%
ludovic_rembert,
User Rank: Apprentice
4/21/2019 | 9:18:23 AM
Lack of secure email is the problem
The study is alarming... and when you consider that many folks around the world still aren't fully "plugged in" to email (yet), the rate of phisphing will only increase. A similar study from the FTC found that phisphing increased by 2,370% between 2015 and 2016. At that rate, it's easy to throw our collective hands up and think, why bother pursuing this? The truth is, that all of us writing this and reading this article most likely have at least a rudimentary grasp on spotting scams and email best practices. Unfortunately, it's usually the poor and downtrodden who tend to fall victim to phisphing scams, "hoping" for some better way out of a bad situation. The issue is that hundreds of millions of users forego secure/encrypted email platforms, such as Tutanota or any of these others. Instead, they gravitate towards a few ESPs like Outlook/Live (which was recently breached), Gmail (which has privacy concerns), and Yahoo!/Hotmail (do people still use these?). 
PhishProtection
50%
50%
PhishProtection,
User Rank: Apprentice
6/19/2019 | 10:58:18 PM
Update of stats?
Is there an update of these stats available? we're trying to get a feed of all live phishnig threats as they happen in 2019 over at phishprotection.com There's a ton of new malware, phishing schemes, ransomware etc since this report so an updated cyber security report would be nice to have.
helenaorstem
100%
0%
helenaorstem,
User Rank: Apprentice
9/3/2019 | 1:57:33 PM
Re: Update of stats?
I really like the dear information you offer in your articles. I'm able to bookmark your site and show the kids check out up here generally. Im fairly positive theyre likely to be informed a great deal of new stuff here than anyone. In addition, how should we take our security measures in 2020?


For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17537
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file deletion via the web/polygon/problem/deletefile?id=1&name=../ substring.
CVE-2019-17538
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring.
CVE-2019-17535
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows blog-list.php XSS, in both the gila-blog and gila-mag themes, via the search parameter, a related issue to CVE-2019-9647.
CVE-2019-17536
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move.
CVE-2019-17533
PUBLISHED: 2019-10-13
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.