Hackers Pull A Tasty Variation on the ACH Cyberheist Technique
On January 19, PC World reported an interesting twist on an old but still favorite phishing scam called the ACH, or Automated Clearing House, scam in a story entitled "Hackers Steal ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
On January 19, PC World reported an interesting twist on an old but still favorite phishing scam called the ACH, or Automated Clearing House, scam in a story entitled "Hackers Steal ...
Last Thursday, we posted a blog entitled "Phishing Primer, Part 1;" here is Part 2 in that ongoing series of brief expositions on this fascinating subject that is also a clear and present ...
Earlier this week on January 18, the US Federal Deposit Insurance Corporation (FDIC) issued its tenth special alert for 2011 (SA-10-2011). Its summary provides an excellent explanation ...
Theres an old saying that If you create a system that any idiot can use, then only idiots will find it useful. And while many companies and organizations may feel compelled to dumb ...
A great many teaching stories from various traditions emphasize how the press of daily life, or normal human emotions, can crowd out and turn off common sense. At its core foundation, ...
Phishing takes its inspiration from the piscatorial arts, where an angler uses an attractive and perhaps even appetizing-looking or –seeming lure (well, to a fish anyway) to entice an ...
Even financial professionals can get snared at work by e-mails that purport to deal with routine, straightforward transactions. One interesting phishing scam that occurred as recently as ...
KnowBe4 will be making a splash in 2011! We have several events on our calendar where you can see us and we hope to see you at several of these events where we would love to show you our ...
Today we did a "Free Security Audit" with a company that wanted to test their 100+ employees. When we talked to the IT Manager and told him what simulated attack we were planning, he said ...
Up to now, Security Awareness Training was static. Canned instruction sessions that could be a year old, an eternity on the Internet. Cyber criminals move fast though. Malware evolves ...
7 Reasons Why Organizations Use Online Training 1. Reduce Costs - How you manage training is always about how you manage costs. 2. Access to Talent - Especially hard when it gets to ...
What is defense-in-depth? Organizations defend their networks on each of the six levels in the graph you see. End-user Internet Security Awareness Training resides in the outer layer: ...
"The Internet is the crime scene of the 21st Century,"