How to Phish Your Own Users And Why
Over the last few years, thousands of organizations in the U.S have started to phish their own users. IT pros have realized that doing this is urgently needed as an additional security ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Over the last few years, thousands of organizations in the U.S have started to phish their own users. IT pros have realized that doing this is urgently needed as an additional security ...
Right after a new, badder version 4.0 of CryptoWall came out, Romanian security company Bitdefender has released a vaccine they claim will block ransomware infections. Andra Zaharia of ...
OK, Heads Up! This has not hit U.S. shores yet, but it's just a matter of time. This nasty bit of crimeware is being beta-tested in Germany at the moment, and that is where the reports ...
Ransomware continues to be a source of worry and now U.S. regulatory agencies are getting in the fray. The Federal Financial Institutions Examination Council (FFIEC) published a statement ...
OK, Heads Up! This has not hit U.S. shores yet, but it's just a matter of time. This nasty bit of crimeware is being beta-tested in Germany at the moment, and that is where the reports ...
Lawrence Abrams from the famous bleepingcomputer site wrote at Spiceworks: "CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a ...
A brand new report from the Cyber Threat Alliance (CTA) showed the staggering damage caused by a single Eastern European cyber mafia. The CTA is an industry group with big-name members ...
We had a great time this year, but we had to keep it short because it was the last day of the month and things were super busy! We did have some time for our yearly parade to the local ...
A brand new report from Cyber Threat Alliance showed the staggering damage caused by a single criminal Eastern European cyber mafia. The CTA is an industry group with big-name members ...
Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, product designs and other trade secrets ...
In-brief: The nation’s top law enforcement agency is warning companies that they may not be able to get their data back from cyber criminals who use Cryptolocker, Cryptowall and other ...
TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial ...
It's "Scam Of The Week" time to warn your users against phishing attacks that try to trick them into winning movie tickets for the new Star Wars movie. For the next 2 months this is going ...
Credit card numbers are small potatoes. Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, ...
Larry Abrams at tech blog Bleeping Computer was the first one to report on this new wrinkle. The ransomware is called LowLevel04 and encrypts data using RSA-2048 encryption, the ransom is ...
CyberheistNews Vol #5 #45 Oct 20, 2015 Apple's OS X Security Honeymoon Is Over Unfortunately, bad guys are business people too. Their time is money, and they follow market leaders. By ...
Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and ...
The banks are promoting that the so called new "Chip & Pin" cards are much safer. They are also called the EMV chip system and touted to be secure. However, this technology is 15 ...
Unfortunately, bad guys are business people too. Their time is money, and they follow market leaders. By now, Apple's market share of desktop computers is close to 17 percent. OS X, ...
Healthcare pros surprisingly get very little security awareness training. Only 38 percent of these employees get security training at least twice a year -- 49 percent get training once a ...