Videos

Join AppRiver's experts for another close-up on the findings of their Global Security Report. This week, we're analysing what the Distributed Spam Distraction Technique actually is and how it's developed over recent years. A cyber criminal basically uses stolen details to incur fraudulent charges - however the e-mail confirmation can't be hidden from the person being scammed. SO they will send this victim thousands of e-mails, which are very difficult to block, in order to...

Read more

The IT Security Guru has been lucky enough to be able to share a series of videos from the security specialists at AppRiver, award winning e-mail and web security solutions providers. The videos will break down the findings from AppRiver's Global Security Report, a quarterly study published by the company that explains the latest trends and threat actors they've seen as they carry out their work, securing millions of inboxes around the world. This first...

Read more

In this video, Fred Touchette, Manager of Security Research at AppRiver, explains the techniques being used by hackers to scam organisations out of money. Using a plethora of techniques, it's evident that attackers are devising ever-more sneaky methods of duping employees and ripping off organisations. When you hear what Fred has to say about spoofing and fraud, you'll think twice when reading your emails! This video is detailing findings of AppRiver's year-end Global Security Report....

Read more

Following their year-end Global Security Report, AppRiver's Manager of Security Research Troy Gill explains their findings and tells us more about what techniques and trends they spotted in 2015. Looking at how malware and the like is being delivered to victims, Troy gives an informative summary of what we've seen in 2015 and what we can expect to come. For more information, visit AppRiver's website: https://www.appriver.com/

Read more

Join Jonathan French, Security Analyst at AppRiver, as he breaks down ransomware and cuts through the jargon to explain what it really is, how people fall victim and what the latest trends are in this area of IT security. Jonathan covers some of the most prevalent and effective campaigns of recent years, so tune in to get the stats, stories and status of Ransomware as we head into 2016. AppRiver has just released their 2015...

Read more

In this video from BAE Systems, Chief Product Officer Neal Watkins highlights five things companies and senior executives should be looking for in a strong defence against cyber attack, providing a straightforward, easy to digest check list for non-technical managers who are looking to understand the threats that face their business. Flight check your company’s cyber security Today our personal lives, society’s essential services and just about every business is online, and that means cyber threats are...

Read more

The Nigerian Government website has been compromised and then used to host a phishing scam, it has emerged today. The Financial reporting Council section of the site contains an embedded phishing scam. The organisation is in charge of accounting standards and overseeing corporate governance - thankfully not in charge of cybersecurity! The fisheries exploited the fact that the site was running an out-of-date version of the Joomla content management system, which allowed them to the...

Read more

The UK and US’ biggest banks will simulate a cyber-attack as officials investigate the sector’s strength in resisting threats of computer hackers targeting the financial industry. Operation Resilient Shield, as the operation has been named, is intended to be the most sophisticated test of network infrastructure and communications yet. Previous tests have tested banking personnel and institutions in the UK alone – the new dimension is adding US institutions to the trial, to assess how...

Read more

In today's news: Government policy on surveillance has taken a new turn as the Department of Homeland Security (DHS) has announced that there are some situations where they do not need a warrant to use cell site simulators - small devices that can identify mobile phone signals and place their general location. These cite simulators, known as stingrays, effectively pretend to be a phone tower, which get phones to communicate with it. Once this has...

Read more
Page 2 of 23 1 2 3 23
Social media & sharing icons powered by UltimatelySocial