Tweets from Elon Musk Still Aren't What They Seem
We've seen this before, and it's worth noting again. A tweet from a blue-checked Elon Musk is all it takes to set a Bitcoin giveaway frenzy into motion. The only problem is that it’s just ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
We've seen this before, and it's worth noting again. A tweet from a blue-checked Elon Musk is all it takes to set a Bitcoin giveaway frenzy into motion. The only problem is that it’s just ...
According to ISACA and the CMMI Institute, organizations continue to invest heavily in security technology while neglecting security training to create the appropriate corporate culture.
We've blogged about other recent studies of security. They're in substantial agreement. Here's one from Gemalto, and it reports that more than 4.5 billion digital records, each with an ...
(Tampa Bay, FL) Nov 7, 2018 -- KnowBe4 is the world's largest new-school security awareness training company with over 21,000 customers. In an aggressive move, KnowBe4 announced a unique ...
A 65-year-old woman from North Carolina, Roxanne Reed, is in jail for allegedly plotting to kill her mother for the insurance money. Roxanne Reed had swallowed a catphishing scam, one in ...
The latest data from CSO’s 2018 U.S. State of Cybercrime report highlights the risk users create, and how little organizations are doing to address it.
Compromised websites focused on tomorrow’s midterm elections serve as the hunting ground for cybercriminals looking to take advantage of unsuspecting visitors.
The average American cannot reliably distinguish between fake and legitimate election campaign emails, according to a study by Valimail. In the weeks leading up to the US midterm ...
This is an excellent opportunity to sit down with your young'uns and explain the risks of online scams.
Cybercriminals don’t want to be caught, so after a data breach, they use unsuspecting people as “mules” to launder money using a sophisticated shipping scam.
Our friends at Malwarebytes reported that a malware strain similar in nature to Stuxnet—but more aggressive and sophisticated—allegedly hit the infrastructure and strategic networks in ...
What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about ...
Pretexting attacks are a growing threat to organizations, warn Chris Tappin and Simon Ezard from the Verizon Threat Research Advisory Centre. Verizon’s 2018 Digital Breach Investigation ...
A phishing scam is using fake login pages to target League of Legends players, according to Avast Blog. At the moment, the attacks are taking place primarily in western Europe, mainly ...
Howard, KnowBe4's HackBusters Discussion Forum Moderator reported on this very interesting phone call he got:
By Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist. Microsoft recently announced a big update to their Microsoft Office 365 (O365) anti-phishing technical capabilities. ...
According to a new survey, social media sharing – and oversharing – provides cybercriminals with important personal details to commit identity theft, fraud, and more.
Check out the content and feature updates in the KnowBe4 platform for the month of October!
The recent rash of cryptocurrency scams on Twitter show organizations that social media is there to share posts and can’t protect platform users.