New Multi-Language Ransomware Crypt0l0cker
Ransomware is being localized for large Asian countries now. There is an ongoing attack targeting Korea, followed by Malaysia and then Japan. If you have business partners or subsidiaries ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Ransomware is being localized for large Asian countries now. There is an ongoing attack targeting Korea, followed by Malaysia and then Japan. If you have business partners or subsidiaries ...
A few days ago, you may have read the news that Tesla Motors had their website and Twitter accounts hijacked by pranksters. OpenDNS has a blog post that goes into great technical detail.
FUN CARTOON: The 5 Generations Of Security Awareness Training For a change, let's have some fun for a moment. InfoSec is gloomy enough as you will see if you keep on reading. So first the ...
Bitcoin is a very speculative currency, still relatively easy to manipulate compared to the major currencies, and subject to massive increases and drops in value. Currently the falling ...
I was at RSA in San Francisco last week. Great show, with ~30,000 attendees and packed exhibit halls at the Moscone Center. We invited KnowBe4 customers who were attending RSA for a ...
*|CyberHeistNews|* Scam Of The Week: IRS Refund Ransomware CyberheistNews Vol 5 #16 Apr 21, 2015 Scam Of The Week: IRS Refund Ransomware Many of us waited till the last moment before the ...
Today, your employees are frequently exposed to advanced phishing and ransomware attacks. Your users are the weak link in your IT security. There are 5 ways (generations) to train ...
Many of us waited till the last moment before the April 15 tax deadline and are now holding our collective breath in expectation of that possibly rewarding refund. The problem is that ...
Don't have time to read through the massive Verizon's 2015 Data Breach Investigations Report? Here is a great summary; 90% of Security incidents are still caused by PEBKAC and ID10T ...
The new Internet Security Threat report from Symantec shows that the growth of file-encrypting ransomware expanded from 8,274 in 2013 to 373,342 in 2014. This is 45 times more ...
Facts surrounding spear phishing all point to employees as the most cited culprits and security awareness training as the most effective remedy. Yet all training programs are not equal. ...
New Ransomware CrypVault Evades AV With Simple Batch Scripts A new ransomware strain dubbed CRYPVAULT is being spread as an email attachment. It's beta testing in Eastern Europe and is ...
In this Wednesday, April 1, 2015 photo, Jeff Salter, CEO of Caring Senior Service, poses for a photo in his company office building in San Antonio. Last December, the network of nearly 30 ...
Wall Street Journal Video About Ransomware and Botnets The WSJ asked itself: Who Will Cybercriminals Target Next? (click on the picture to see the video at the WSJ website). ...
According to a new CyberEdge research survey of 19 sectors, including government, spearphishing is the biggest concern to IT security pros, more worrisome than even malware. And only 20 ...
Websense released their annual Threat Report, which is interesting if you want to know what’s really happening in the criminal cyber landscape. Here are a few highlights, with a link to ...
New Ransomware CrypVault Evades AV With Simple Batch Scripts A new ransomware strain dubbed CRYPVAULT by Trend Micro is being spread as an email attachment. It's currently focusing on ...
April 7, 2015 - CNN reported that The White House said it noticed suspicious activity in the unclassified network that serves the executive office of the president. The KnowBe4 Blog ...
Fortune reported: "Each fall, Facebook hosts an event called Hacktober in which its security experts attempt to trick employees into falling for common hacking tricks such as phishing ...
IBM ALERT: 'Dyre Wolf' Uses Spear Phishing For $1Mil+ Cyberheists Last week, IBM Security reported on an active cyberheist campaign using a variant of the Dyre Trojan that has ...