Antivirus Isn't Dead, It Just Can't Keep Up
A few months ago, a company called LastLine Labs published some explosive data about antivirus products. They studied hundreds of thousands of pieces of malware for a year, and tracked ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
A few months ago, a company called LastLine Labs published some explosive data about antivirus products. They studied hundreds of thousands of pieces of malware for a year, and tracked ...
January 9, 2015 - CBS This Morning News ran an item about ransomware featuring Shawn Henry, former FBI executive assistant director and president of cyber security firm CrowdStrike ...
Hi All, I have some very good news I want to share.
Most small- and medium business owners think that they are not a target for cybercrime. Well, if you think you are safe because you are just a little fish in a big pond, think again. ...
CyberheistNews Vol 5 #1 Jan 6, 2015 Kim Zetter did her homework and extrapolated for WIRED magazine the current threats and looked at how they would unfold in the coming 12 months. She ...
The Wall Street Journal polled its readers and asked them to rate the top compliance issues of 2014. The answers were very interesting!
Well-known IT Security guru Bruce Schneier commented on recent discoveries related to the Sony Hack. First of all, an analysis of the timestamps on some of the leaked documents shows that ...
Organizations defend their networks on each of the six levels in the green graph you see. End-user Internet Security Awareness Training resides in the outer layer: ‘Policies, Procedures, ...
TK Keanini, CTO, Lancope wrote a 2015 Predictions editorial over at SC Magazine. He said he expects more malware like CryptoLocker and CryptoWall over the next 12 months, but also ...
Mitch Lipka of CBS Moneywatch wrote:
CyberheistNews Vol 4 #51 Dec 30, 2014 2015 Crystal Ball / Three Scams To Warn Your Users About During my 15-year stint as the editor of WServerNews, I always started the year with a ...
It's the holidays and the bad guys are working overtime. There are three scams you want to warn your users about. Remember the Phil Esterhaus character in Hill Street Blues? To begin ...
Lance Spitzner at the SANS Securing The Human program and I have a lot in common; we evangelize effective security awareness training and we both drive a Tesla. In his 22 December 2014 ...
This is actually quite interesting, hackers that are successful inside Russia, as normally these guys are shut down by the FSB in a heartbeat. It must be that they are outside of the ...
Following last year’s big announcement of not just Target’s data breach but executive job loss, CSO lays out 9 data breaches resulting in job loss. They compare Target alongside other ...
This Sony Pictures Cyber Attack TIMELINE by the www.databreachtoday.com site is quite interesting.
MIS Training Institute (MISTI) and their esteemed Advisory Board are excited to present the InfoSec World 2015 Conference & Expo. KnowBe4's CyberheistNews is a Media Sponsor for the ...
Hackers breached security of a German steel mill's network and caused considerable damage by manipulating the controls of a blast furnace. The attackers gained access to the network ...
Lessons Learned From The Sony Pictures Hack Bruce Schneier reminded me of an old but very relevant concept in IT Security. There are two types of attacks: opportunistic and targeted. And ...
System admins hold the keys to the kingdom. The NSA is actively hunting for system admin credentials. A popular way to get you to click on something that installs zero-day malware on your ...