The Cybercrime Economy Makes It Impossible to Stop
The operation run by botnet author Peter Levashov demonstrates how easy it is for would-be criminals to get into the business.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
The operation run by botnet author Peter Levashov demonstrates how easy it is for would-be criminals to get into the business.
This is common wisdom, but it bears repeating, because common wisdom is easily overlooked. People are often called an organization's greatest asset. They're also its greatest ...
As the holiday season approaches, cybercriminals are set to scam your users out of their personal money but also your organizational budget.
I gave you a heads-up a few days ago, and now I'm excited to announce the actual release of a new tool to help protect your organization from cybercriminals.
Curtin Franklin at Darkreading correctly observed: "USB thumb drives may be used less frequently than before, but they are still commonly used as infection vectors for a wide variety of ...
The US Marshals Service has stated that a new phone scam is targeting residents of Marshall, Texas. The scammer claims to be from the local sheriff’s office and tells residents that the ...
Ewww. Something else to watch out for. Will it ever stop?. Ummm, no.
New data shows a surge in attacks, what industries are targets, which users are at risk, and what you can expect to see in the future.
We’ve noted in other posts that events like natural disasters are inevitably used as phishbait by scammers. The Atlantic hurricane season, which breeds storms like the recent and very ...
Charlie Osborne reported at ZDNet that Adwind, a Remote Access Trojan (RAT) previously connected to attacks against industries worldwide, is back with a new toolkit designed to trick ...
Written by Guest Blogger Nick Cavalancia, Microsoft MVP Hear one cybersecurity expert’s experience of missing the signs and getting duped over the phone. If it can happen to him, it can ...
Nearly half of hackers surveyed at the recent Black Hat conference in Las Vegas admitted easily compromising both Windows 8 and 10 in the past year.
A phishing attack on an Office 365-account enabled a 3 Mil CEO Fraud Scam at an investment firm. Finnish antivirus company F-Secure reported on their blog. One of the employees at the ...
This is the very first time I am giving you a heads-up about a new, complimentary tool that you really should run ASAP. It's called Domain Doppelgänger and will be released Thursday ...
Frances Zelazny, Vice President of BioCatch, gave a recent Tech Republic interview to share some insight into how hackers can access your passwords. It's familiar but worth reviewing, ...
S mall and medium business owners often a ssume they're not a likely target of cybercrime. This is a dangerous mistake for to make. Cyber attacks on smaller organizations can be ...
Security cultures don’t exist within organizations because IT wills them to. With the increase in attacks, organizations need internal advocates for the necessary shift in corporate ...
The recent data breach of pre-IPO biotech firm Guardant Health shows how much impact a single successful phishing attack can have on an organization.
Microsoft Office documents containing malicious macros accounted for 45 percent of malware loaders in August 2018, according to a blog post by Cofense. These macros were used to deliver a ...