How you can identify different types of phishing attacks
Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat. Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent...
Hacker groups going after government domains
Hacker groups going after government domains Security researchers are suspecting state-sponsored actors. Imagine typing in a government internet address, and ending up on a website that looks like a government website, acts like a government website, but steals your...
Hackers broke into university networks in just 2 hours
Hackers broke into university networks in just two hours Penetration testers testing university networks were able to use phishing emails to gain administrator access and access personal data, financial information and confidential research. Ethical hackers testing...See how Mimecast can make email safer for YOUR business
See how Mimecast can make email safer for YOUR business Mimecast’s security, archiving and continuity cloud services deliver comprehensive email risk management in one fully-integrated subscription service. Let Mimecast help you: Protect against...







