Black Hole Malware Dominates Web So Train Your Employees
[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...
Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.
[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...
Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/
10/15/12 - the FBI announced a new initiative: "With school back in session, one topic thats on many class curriculums around the nation is cyber safety. After all, its a ...
Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...
By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...
The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...
Doug Barney, Editor in Chief of Redmond Magazine did a write-up about our new Kevin Mitnick Security Awareness Training, which was pretty fun. You can read his blog post here
[caption id="" align="alignleft" width="230" caption="Mobile Security"][/caption] NEW YORK (CNNMoney) -- Security experts have warned for years that our smartphones are due for a major ...
Could you do us a big favor? Spend one minute! We asked people which things they thought were important for Internet Security at the house. In other words, what they thought was needed to ...
(1) To start off with, have a BYOD project leader that has the authority to enforce the required policies, procedures, and training to get BYOD implemented securely.
KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay I was interviewed as a panel member at the Front Row Tampa Bay event during the 2012 RNC in Tampa, FL about the benefits of ...
[caption id="" align="aligncenter" width="250" caption="9 Biggest Security Threats"][/caption] By now you probably know I am a fan of Roger Grimes. He's a highly skillled security veteran ...
[caption id="" align="aligncenter" width="500" caption="What is wrong with this picture?"][/caption] This picture is a screen shot from the Polish TV Channel TVP. See something that ...
[caption id="" align="alignleft" width="300" caption="(Flickr user Alan Cleaver)"][/caption] (MoneyWatch) With the National Republican Convention fast approaching at the end of August, ...
[caption id="" align="alignleft" width="300" caption="Apple Tech Social Engineered"][/caption] [UPDATED August 7] Former Gizmodo reporter Mat Honan was hacked hard. He found out that an ...
The Gameover Zeus botnet is now the biggest financial fraud botnet around, and it's run by a single cybercrime group out of Eastern Europe, according to new research. Brett Stone-Gross, ...
[caption id="" align="alignleft" width="350" caption="KnowBe4 InfoWorld Frontpage"][/caption] J. Peter Bruzzese, InfoWorld's Enterprise Windows columnist interviewed me yesterday about ...
[caption id="" align="alignleft" width="300" caption="Espionage Botnets"][/caption] Brian Krebs just blogged about something very interesting. "A security researcher whos spent 18 months ...
[caption id="" align="alignleft" width="300" caption="Cyberheist Reviewed"][/caption]
[caption id="" align="alignleft" width="200" caption="Front Row Tampa Bay"][/caption] With the Republican National Convention quickly approaching in Tampa, tens of thousands of visitors ...