IntSights’ Retail Threat Report Details Rise in Phishing
Hikvision Cybersecurity Director Offers Tips to Detect Phishing Emails
The Oct. 2018 “Retail Threat Landscape Report” by cyber research firm IntSights discovered an increase in targeting of retailers using phishing email in an attempt to capture customer login credentials, according to an article in Security magazine.
The research showed that Q3 had an average of 23 phishing sites per company, up from the same period in 2017, which averaged 5.9 phishing attacks per company. The report also highlighted a 278 percent increase in stolen goods listed for resale and a 345 percent increase in fake social media profiles.
"Retailers are increasingly focused on driving sales through a variety of online channels—Facebook, SMS messaging, Instagram, Twitter and more—all of which provide an ideal opportunity for fraudsters to lure in new victims through phishing attacks, as it is the most common way to obtain stolen credit card numbers. As prime targets for cyber crime, retailers need to understand how their goods are being sold and bartered on the Dark Web. This glimpse into criminal behavior and activity helps inform the overall cybersecurity program, leading to an increase in security posture,” said Guy Nizan, CEO of IntSights, in the article.
Click here for more about the report.
Hikvision’s director of cybersecurity, Chuck Davis, recently authored a two-part blog outlining tips to identify phishing emails. In part two, Davis said: “Phishing has long been an effective way for attackers to trick people into divulging sensitive information or infecting a system with malware. Malware can give an attacker remote access to protected systems and networks, encrypt a user’s data and charge a ransom to decrypt the data, or use that system as part of an attack against other systems. A critical part of malware defense is identifying a phishing attack.”
Read “Hikvision’s Director of Cybersecurity Outlines Examples of Phishing,” and click this link for part two of the phishing blog.