Security Awareness Training Blog

IT Security Blog

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

Hackers exploit Skype API to infect Windows PCs

Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...
Continue Reading

Defending Against Phishing Attacks

By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...
Continue Reading

Scam Of The Week You Have Been Targeted For Assasination

The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...
Continue Reading

Ex-Sunbelter Joins ex-Hacker Mitnick in Anti-Hacker Training

Doug Barney, Editor in Chief of Redmond Magazine did a write-up about our new Kevin Mitnick Security Awareness Training, which was pretty fun. You can read his blog post here
Continue Reading

I was quoted on CNNMoney re mobile security

[caption id="" align="alignleft" width="230" caption="Mobile Security"][/caption] NEW YORK (CNNMoney) -- Security experts have warned for years that our smartphones are due for a major ...
Continue Reading

1-Minute-Internet-Security-Survey

Could you do us a big favor? Spend one minute! We asked people which things they thought were important for Internet Security at the house. In other words, what they thought was needed to ...
Continue Reading

5 BYOD Deployment Rules

(1) To start off with, have a BYOD project leader that has the authority to enforce the required policies, procedures, and training to get BYOD implemented securely.
Continue Reading

KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay

KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay I was interviewed as a panel member at the Front Row Tampa Bay event during the 2012 RNC in Tampa, FL about the benefits of ...
Continue Reading

IT's 9 Biggest Security Threats

[caption id="" align="aligncenter" width="250" caption="9 Biggest Security Threats"][/caption] By now you probably know I am a fan of Roger Grimes. He's a highly skillled security veteran ...
Continue Reading

What is wrong with this picture?

[caption id="" align="aligncenter" width="500" caption="What is wrong with this picture?"][/caption] This picture is a screen shot from the Polish TV Channel TVP. See something that ...
Continue Reading

Top hacker details how to avoid cybercrime

[caption id="" align="alignleft" width="300" caption="(Flickr user Alan Cleaver)"][/caption] (MoneyWatch) With the National Republican Convention fast approaching at the end of August, ...
Continue Reading

Apple social engineered - Allows access to iCloud

[caption id="" align="alignleft" width="300" caption="Apple Tech Social Engineered"][/caption] [UPDATED August 7] Former Gizmodo reporter Mat Honan was hacked hard. He found out that an ...
Continue Reading

More Than Half Of Top 20 Fortune 500 Firms Infected With Gameover Zeus Botnet

The Gameover Zeus botnet is now the biggest financial fraud botnet around, and it's run by a single cybercrime group out of Eastern Europe, according to new research. Brett Stone-Gross, ...
Continue Reading

KnowBe4 Makes InfoWorld Frontpage

[caption id="" align="alignleft" width="350" caption="KnowBe4 InfoWorld Frontpage"][/caption] J. Peter Bruzzese, InfoWorld's Enterprise Windows columnist interviewed me yesterday about ...
Continue Reading

Espionage Botnets

[caption id="" align="alignleft" width="300" caption="Espionage Botnets"][/caption] Brian Krebs just blogged about something very interesting. "A security researcher who’s spent 18 months ...
Continue Reading

My Book Cyberheist: 4-Star Review By Security Expert

[caption id="" align="alignleft" width="300" caption="Cyberheist Reviewed"][/caption]
Continue Reading

Should Compliance Drive Security?

[caption id="" align="alignleft" width="300" caption="Should Compliance Drive Security?"][/caption] Practically all of us accept credit cards, so we need to be PCI compliant. The question ...
Continue Reading

KnowBe4 Sponsors Front Row Tampa Bay

[caption id="" align="alignleft" width="200" caption="Front Row Tampa Bay"][/caption] With the Republican National Convention quickly approaching in Tampa, tens of thousands of visitors ...
Continue Reading

8 Signs You Have Been Hacked

[caption id="" align="aligncenter" width="580" caption="8 Signs You Have Been Hacked"][/caption]
Continue Reading

Security Is Not Only Training It Is Culture

We all went to school, but how would you do if you were asked to retake your finals? Neither would I. Education fades unless it is regularly reinforced. And even the reinforcement is ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews