Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Compromised websites focused on tomorrow’s midterm elections serve as the hunting ground for cybercriminals looking to take advantage of unsuspecting visitors.
The average American cannot reliably distinguish between fake and legitimate election campaign emails, according to a study by Valimail. In the weeks leading up to the US midterm ...
This is an excellent opportunity to sit down with your young'uns and explain the risks of online scams.
Cybercriminals don’t want to be caught, so after a data breach, they use unsuspecting people as “mules” to launder money using a sophisticated shipping scam.
Our friends at Malwarebytes reported that a malware strain similar in nature to Stuxnet—but more aggressive and sophisticated—allegedly hit the infrastructure and strategic networks in ...
What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about ...
Pretexting attacks are a growing threat to organizations, warn Chris Tappin and Simon Ezard from the Verizon Threat Research Advisory Centre. Verizon’s 2018 Digital Breach Investigation ...
A phishing scam is using fake login pages to target League of Legends players, according to Avast Blog. At the moment, the attacks are taking place primarily in western Europe, mainly ...
Howard, KnowBe4's HackBusters Discussion Forum Moderator reported on this very interesting phone call he got:
According to a new survey, social media sharing – and oversharing – provides cybercriminals with important personal details to commit identity theft, fraud, and more.
Check out the content and feature updates in the KnowBe4 platform for the month of October!
The recent rash of cryptocurrency scams on Twitter show organizations that social media is there to share posts and can’t protect platform users.
Just a shot of almost 600 people in costume !!!
The Tesla founder’s recent tweet about cryptocurrency got him temporarily locked out of his Twitter account, demonstrating the seriousness of the scam.
With Microsoft’s latest release of Windows Defender running in a virtual sandbox (the first of its kind), it may be time to focus your energies – and budget – on other parts of your ...
Ignorance of security policies and security threats is one of the primary reasons why employees break cybersecurity rules, says Ericka Chickowski at Dark Reading. A study conducted by ...
Attacks leveraging look-alike federated logon pages are more dangerous than malware-laden attachments in email.
FireEye thinks it found the evil genius behind a nasty cyber-infection at a Saudi Oil refinery.