VCs Validate Security Awareness Training
I am very encouraged to see our friends at PhishMe getting 2.5 Million in Venture money to expand their business. With this new investment, Christopher Steed, Vice President at Paladin ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
I am very encouraged to see our friends at PhishMe getting 2.5 Million in Venture money to expand their business. With this new investment, Christopher Steed, Vice President at Paladin ...
On competition: "Every successful startup goes through four phases in the eyes of competitors. First, they ignore you, because you're tiny and irrelevant. Then they ridicule you, because ...
ITPRO UK was early this year with their crystal ball predictions! "As the end of the year closes in on us, it's time to think about the profile of the enterprise threat surface for the ...
Help Net Security had the story: The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the ...
In the annals of what-was-I-thinking moments in computer security, this has to be one of the most gobsmacking. According to a Bloomberg News investigation of a series of undisclosed ...
[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome errors a ...
Brian Krebs has an excellent example of a recent cyberheist. Read it and weep! The $180,000 robbery took the building security and maintenance system installer Primary Systems Inc. by ...
Twice a year, KnowBe4 publishes the Top 5 spear-phishing attacks that are used to lure executives into clicking on links or open infected attachments. We recommend sending this list to ...
Did you know? On any given day across the globe, the number of iPhones sold will exceed the number of babies born (378,000 to 371,000) The problem is that mobile device security has not ...
Ellen Messmer at Network World covered this one: "Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's ...
I just recevied some interesting information. SearchSecurity.com surveyed IT professionals about their end-user security training purchase intentions for 2013. The numbers are revealing. ...
[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...
Some of you might remember Sunbelt Software, which from 1996 to 2010 sold system admin and security tools for Windows Server. I am one of the two co-founders of Sunbelt. After ...
[caption id="Cybergeddon" align="aligncenter" width="570"]Missy Peregrym in the Yahoo Web series Cybergeddon Still from Cyberteddon © Yahoo. All rights reserved.[/caption] Not sure how I ...
[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...
[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...
[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...