PDF 0-day Vulnerability Being Exploited In The Wild
Last week, Adobe warned customers that a few new exploits that target Acrobat Reader were being exploited in the wild. Keep an eye out for patches that are expected soon. The exploits are ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Last week, Adobe warned customers that a few new exploits that target Acrobat Reader were being exploited in the wild. Keep an eye out for patches that are expected soon. The exploits are ...
Antone Gonsales at the CSO site hits the nail on the head: "Email security vendors have failed to do enough to protect customers against advanced cyberattacks like the one recently linked ...
I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...
Last Tuesday, the White House issued the long awaited CyberSec Executive Order, which makes an attempt to outline policies that will protect US organizations against cyber-attacks and ...
KnowBe4 is a market leader in security awareness training for employees in an office environment. However, when we asked people who finished the training what they thought, they said they ...
You may be familiar with our friends at SANS. For their 'Securing The Human' team, every month is security awareness month, same as here at KnowBe4. On the first of every month they post ...
Did you ever expect that our IT networks would be a worldwide battleground for highly sophisticated cyber warfare? IT security certainly will provide job security for the next decade or ...
Febuary 2, 2013 - Today, Kevin Mitnick is part of Home Shopping Network's TODAY SPECIAL! Kevin partnered with KnowBe4 to create security awareness training for employees in an enterprise ...
Today, Jan 29 2013, the Department of Homeland Security advises computer users to disable Universal Plug and Play (UPnP), after researchers at Rapid7 alerted DHS that hackers could ...
Arbor networks Worldwide Infrastructure Security Report (WISR) shows that ideology is the primary attack motivation, followed by online gaming and vandalism. Click on the graphic to go to ...
Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...
Facebook is loved far and wide by scammers. It's a great pool of an almost unlimited amount of victims, most of whom are gullible enough to fall for the most simple scams. Shooting fish ...
You may know that we are coming out with an Home Internet Security Course for consumers. Why? When we asked the participants who finished our enterprise Kevin Mitnick Security Awareness ...
Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company called Cryptzone who interviewed 300 IT Security ...
Zuck has come out with something new, and you always need to watch it when that happens. It's a combination of big data and social networking so that people can easily find new friends, ...
And got their $20 Amazon Gift card sent to them today. Again, thanks very much for participating in the Kevin Mitnick Home Internet Security Training. The overall feedback was incredibly ...