The history and derivation of the word phishing...
The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...
On May 7, executives of Equifax submitted a "statement for the record" to the Securities and Exchange Commission detailing the extent of the consumer data breach the company first ...
KnowBe4 is proud to announce support for delegated permissions as part of the Security Roles feature. Security Roles allows you to limit roles to only display specific data or allow for ...
Our friend Larry Abrams at Bleepingcomputer said: "I am trying something new where I will post in brief articles about new ransomware as they are released. Many of these ransomware ...
OK, here is something really scary. KnowBe4's Chief Hacking Officer Kevin Mitnick now and then calls me with some chilling news. This time, Kuba Gretzky, a white hat hacker friend of ...
Attackers know that companies are sending a lot of emails to customers about GDPR—and that makes them prime opportunity for phishing attacks. With the looming GDPR May 25 deadline almost ...
This is the second year we've published quarterly results of the most-clicked phishing email subjects across a few categories. We separate the data into subjects related to social media ...
Catalin Cimpanu at Bleepingcomputer reported: "Chinese cyber spies are evolving their tactics, focusing on IT staffers, relying more and more on spear phishing instead of malware, and ...
According to Trend Micro researchers a new ransomware strain called Blackheart drops its payload alongside the perfectly legitimate AnyDesk remote desktop tool, highly likely as a way to ...
The most common infection vectors are still email phishing and drive-by downloads according to the latest threat report from AI security specialist Cylance. The report provides a ...
Troy Hunt, the founder of Haveibeenpwned came out with some brand new numbers that show there's bad news and there's more bad news. A few months ago he launched V2 of his Pwned Passwords ...
"A school district located in Massachusetts paid attackers $10,000 after they infected its computer network with crypto-ransomware. Officials at Leominster Public Schools decided to meet ...
Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...
Brad Haan sent me this riot cartoon:
Why is credentials phishing moving from consumers to the enterprise, just like ransomware has done in the last 2 years? The answer might surprise you. Elliot Volkman at the PhishLabs ...
We have some good news! The "2018 Safe Web Browsing" and "2018 Ransomware" module's 20 language versions are now better than ever. As of today, the following improvements are now present ...
Attorneys Zuckerman Spaeder noted on JDSUPRA: "When employers are caught off guard, they can face not only the loss of their own assets, but also liability to their employees. For ...
The notorious Necurs botnet is one of the oldest and largest spam and phishing delivery systems in existence. It controls millions of machines that the criminal botmasters use to send ...
PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security ...