'Tis the season to watch out for W-2 phishing scams

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Feb 27, 2017
Featured Image

5 ways to spot a phishing email

Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we've put together this list of clues to help you avoid a costly error. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

'Tis the season to watch out for W-2 phishing scams
Ransomware 'customer support' chat reveals criminals' ruthlessness
Phishing campaign uses Yahoo breach to hook email

Video/Webcast: CA Technologies

Live Webcast: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Read More

Thumbnail Image

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits Read More

Thumbnail Image

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support. Read More

Thumbnail Image

Phishing campaign uses Yahoo breach to hook email

A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security Read More

White Paper: Citrix Systems

Managing IT at Multiple Clinics

Network managers find branch office network solutions increasingly complex, inflexible and costly to deploy and manage. While WAN optimization solutions help with ensuring a consistent user experience, they can't overcome all the issues when the underlying WAN is unreliable or unavailable. Read More

Top 5 Stories

1. Cybersecurity: What does the board want?
2. Java and Python FTP attacks can punch holes through firewalls
3. 9 new hacks coming to get you
4. Would killing Bitcoin end ransomware?
5. Cloudflare server errors blamed for leaked customer data

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.