A day in the life of a cyber-criminal
I lay awake in bed looking over at the alarm clock on my side table it indicates 5:59 am, I am waiting for it to click over to 6 am and the alarm to sound. Click.
Craig Ford | 26 Feb | Read more
I lay awake in bed looking over at the alarm clock on my side table it indicates 5:59 am, I am waiting for it to click over to 6 am and the alarm to sound. Click.
Craig Ford | 26 Feb | Read more
Australian business executives are proving to be desirable targets for scammers that have been remarkably successful at using business email compromise (BEC) (also known as 'whaling') schemes to wring millions of dollars from unwitting victims. Yet even as they struggle to clamp down on losses to scammers breaches of the so-called human firewall, those same businesses are also becoming key contributors to efforts to stop BEC in its tracks.
David Braue | 19 Sep | Read more
Strong growth in the Australian operations of cloud-based security vendor Mimecast has validated the company's decision to invest heavily in expanding its local operations and headcount
David Braue | 06 Sep | Read more
Phishing, spearphishing, whaling are all nautical terms that have been created or adopted by the information security industry. The AFP has coined a new term.
Anthony Caruana | 14 Apr | Read more
Fraudsters are using legitimate executive names and email addresses to dupe unsuspecting employees to wire money or sensitive documents to their accounts. The CTO of the Boston Celtics, for one, is fighting back.
Clint Boulton | 21 Apr | Read more
Security is an ever-evolving threat landscape. Even with the best in-breed security systems, there is still a possibility that your company is at risk. This whitepaper covers the 8 important things CIOs need to know about whaling and some useful tips they can use to protect their organisation from being held ransom to such attacks.