Your Users Need to be Smarter than the Scammers
Fraudsters have all but eliminated indicators used to detect fake identities on line, reports Socure, a predictive analytics provider. The difference between authentic and fake identities ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Fraudsters have all but eliminated indicators used to detect fake identities on line, reports Socure, a predictive analytics provider. The difference between authentic and fake identities ...
Annual ransomware-induced costs are projected to exceed $11.5 billion by 2019, according to Veeam. Defined by the Department of Justice as “a new model of cybercrime with a potential to ...
Phishing campaigns are growing more sophisticated as industries become increasingly aware of the threat they pose. Some of these attacks are so clever and meticulously crafted that many ...
The latest attack from the Russian GRU involves both traditional spear phishing and close access attacks in an attempt to thwart an investigation of the nerve agent attack in the UK.
Cybercriminals thrive on misuse of credentials, and users sharing them only makes the criminal’s job easier. The latest report from LastPass shows password sharing is rampant.
You’re already worried about the possibility of becoming a victim of a cyber scam. Be sure you clearly understand what your cyber insurance coverage is, or you may feel like you got taken ...
According to the 2018 Traveler’s Risk Index, the percentage of businesses that have been the victim of a cyberattack has doubled… and most businesses aren’t even remotely ready.
Phone scams are becoming more convincing as attackers devise new ways to sound legitimate. KrebsOnSecurity recently spoke with several readers who'd been targeted by voice phishing, or ...
We are excited to announce the availability of two new features, Virtual Risk Officer and Advanced Reporting.
October 4th, 2018. Announced by the UK National Cyber Security Centre (NCSC), the UK and its allies exposed a ransomware campaign by the GRU, the Russian military intelligence service, of ...
Do your users know what to do when they receive a suspicious email? Should they call the help desk, or forward it? Should they forward to IT including all headers? Delete and not report ...
Over the last few months, Kevin has been talking about this possibility: embedding malicious code in cables. This is a brand new demo where he shows this is now technically feasible! See ...
Check out the new features and training content in the KnowBe4 platform for September! So how much security awareness training content do you have access to with a Diamond subscription? ...
I'm excited to announce our incredible year-over-year sales increase, nearly doubling 2017's third quarter sales in this third quarter of 2018, breaking records with new corporate ...
The latest data from SecurityScorecard shows the retail industry’s security stance is at an all-time low, and is particularly susceptible to social engineering attacks. The retail ...
TL,DR: A recent phishing attack posing as a PDF decoy from a Denver law firm was stealing clients' Office 365 credentials. The phishing bait was hosted in Azure blob storage and contained ...
Despite the presence of application and OS vulnerabilities – both new and old – hackers prefer to leverage social engineering as their preferred attack method.
With so many security strategies revolving around the detection of malware, organizations forget the primary source of all their worries – phishing.