To click or not to click: What F-Secure learned from phishing 80,000 people
According to a new study from F-Secure, phishing emails mimicking HR announcements or asking for assistance with invoicing get the most clicks from recipients.
F-Secure and CyberPeace Institute partnership to counter attacks against vulnerable communities
Global cybersecurity provider F-Secure has signed a letter of intent with the Switzerland-based CyberPeace Institute to counter attacks against vulnerable communities.
A third of suspicious emails reported by employees are phishing
New research has found 33% of emails employees report as phishing are either malicious or highly suspect.
Ransomware ravages Ireland's health service - experts comment
Ireland’s National Cyber Security Centre points to the ‘Conti’ ransomware variant, which caused the HSE's IT systems to shut down over the weekend.
CISOs facing rising security debts
Chief information security officers are facing a rising security debt to secure their organisations against an increasing volume of attacks by well-armed criminals.
CISOs, don't underestimate the importance of soft skills
There is increasing importance on Chief Information Security Officers (CISOs) having and developing the skill of emotional intelligence, a new report states.
Video: 10 Minute IT Jams – F-Secure talks APTs and the Lazarus Group
We spoke to F-Secure's director of detection and response, Matt Lawrence.
Lazarus Group linked to phishing attacks on cryptocurrency sector
In this case, the attacks were launched through a phishing document sent via LinkedIn to employees at the targeted organisation. This phishing document was styled to look like a job advertisement for a role in a blockchain company.
This is what our kids will hate us for: IoT devices 'asbestos of the future'
"The proliferation of stupid internet-connected smart devices will be the IT asbestos of the future.
F5 Networks' BIG-IP load balancer product vulnerable to attack
Organisations that use F5 Networks BIG-IP load balancer should immediately check their configurations to ensure they are protected from potentially serious security issues.
Security breaches of great concern to consumers
“These findings show many people are seeing the damage of cyber crime or identity theft firsthand.”
Security alert: More than 2 million IoT devices are now junk
More than two million security cameras, baby monitors, and smart doorbells are affected by security vulnerabilities that could allow cybercriminals to hack devices and spy on homes.
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
Something old, nothing new: Cybercrims still rely on spam
The probability of a recipient opening an email increases 12% if the email claims to come from a known individual.
Electronic lock vulnerabilities can lead attackers directly to your hotel room
Next time you stay at a hotel as part of a business or personal trip, you may want to ask if the hotel’s locking systems are up-to-date.
Corporate users warned Intel AMT flaw has 'destructive' potential
Anyone who gains physical access to a machine could create a backdoor in less than 30 seconds and use the backdoor to remotely monitor activities.
Monetary Authority of Singapore launches Cyber Security Advisory Panel
The Monetary Authority of Singapore has set up its own Cyber Security Advisory Panel that includes global security experts and thought leaders.
F-Secure launches channel partner incentive program for India
“We’ve engaged with many potential partners in all the regions who’ve been actively contributing to our positive growth."
Hemisphere Technologies scoops up exclusive F-Secure distribution
Hemisphere Technologies has inked an exclusive distie deal with F-Secure opening the door for new business opportunities for the local channel.
Here's why you need to be aware of the internet of things
The rise of the internet of things is bringing an exponential increase in security threats for business and consumers, making IoT awareness crucial.
Drive-by downloads proving popular amongst hackers
“If you hear a major site was serving up malware through bad ads, chances are a drive-by download was involved.”
Public Wi-Fi - how risky is it?
“The hackers collected detailed browsing history, VoIP calls, email accounts, contacts, online financial services, email and social media accounts."