phishing

phishing awareness training

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 8, CATFISHING

Get in touch with Keepnet for the best phishing awareness training. HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 8, CATFISHING In Episode 8, Keith falls into a Catfishing scam through an online dating website.  Online dating scams are extremely common and relatively easy to pull off for the hacker.  They use [...]

Read more...
antiphishing tools and phishing protection software

Phishing Attacks with Legitimate URLs

Contact Keepnet for the best antiphishing tools and phishing protection software! Throughout the years, cybercriminals have become more skilled at escaping the discovery by lurking within benign things and attacking their targets. They essentially utilise of URLs that lead targets to genuine yet compromised websites or have safe-looking redirectors that ultimately [...]

Read more...
Top Spear Phishing Threats and Trends

Top Spear Phishing Threats and Trends

Spear phishing, a specific method of email-based crime, has been increasing in notoriety among cybercriminals today. By studying their victims and frame thoughtfully-designed communications, they oftentimes portraying themselves as a trusted associate, entity or business. Spear-phishing attacks usually aim to seize sensitive data,  like social media login information or [...]

Read more...
Social Media Phishing

Social Media Phishing

Social media phishing is currently on the rise.  There are billions of social media users around the world. However,  little is known about social media usages and its determinants that conclusively affect users’ vulnerability phishing attacks on social media platforms.  Nevertheless, social networking platforms are a popular way used by [...]

Read more...

Mobile phishing attacks

A report from mobile security company Wandera, reveals a rising threat, phishing on mobile devices. According to report, 81 % mobile phishing attacks were initiated outside of email, 63% happen on iOS devices, and 12 % of all mobile security incidents involve phishing URLs. 1 2 Known phishing URLs are [...]

Read more...