Cyber Attack Maps...Accurate Or Just Eye Candy?
Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.
Here are the top 5 Cyber Attack Maps found in Google. They all seem to show the cyber attacks in a slightly different perspective. This is the Norse attack map as an example:
Brian Honan wrote a GREAT post at HelpnetSecurity. This is a cross-post of his excellent article, nothing changed, all the internal links to helpnet security were left in place. "There is ...
Someone interested in using our integrated platform for training and phishing asked us: ""What methodologies does KnowBe4 use in developing our training?" We use the ARCS Model. ARCS is ...
If you've been in the IT trenches over the past year, you've probably noticed the announcements of new strains of ransomware are accelerating. The research team at Proofpoint just ...
Been suspecting that your users are plugging in any USB stick they find, to see what is on it? Well, you are right, they actually do that. Fresh scientific research by Google, and the ...
Ransomware continues to be a successfull business for the cybercriminals of the world. It can easily get past even the best anti-virus software through a user just clicking once on ...
One thing that is driving mainstream recognition of ransomware is the move by the Dridex banking Trojan gang into ransomware with their Locky strain. They have taken over from CryptoWall, ...
It helps to know how to spell when you try to rob a billion from a dirt poor country. A spelling mistake thwarted hackers in stealing a $1 billion dollars from the Bangladesh Bank, and ...
A Snapchat employee fell for a W-2 phishing scam last week, compromising the identity information of other existing and ex-employees. The FBI calls this a Business Email Compromise, also ...
Since releasing its free PhishAlert button in November 2015, KnowBe4 has been receiving a steady stream of emails flagged by users as potential phishing attacks. The email threats ...
We had a data scientist take a look at more than 4 years of aggregated clicking data and he came up with some interesting results, expressed in graphs. Here are some of the highlights:
Hi Guys, this is too good to miss. Check out this brand new article in Forbes Magazine. They started out with:
I found a very interesting article at the ValueWalk site about the FDIC requiring banks to improve their cyber security, they started out with:
Between 3 and 4 million smartphones are stolen every year. It's your modern-day purse snatching. Many people put their entire private and work lives on these devices that can cost up to ...
Researchers discovered a sample of ransomware that damages files permanently. The malicious code is based on the work of Turkish Oktu Sen security researchers, who last year made their ...
Jerome Segura, a senior security researcher over at our friends at Malwarebytes reported about a new, in-the-wild tech support scam that has moved from Amazon Web Services to Rackspace's ...
Federal regulators have hit the University of Washington Medicine with a $750,000 penalty and a corrective action plan as part of a HIPAA settlement after a 2013 malware-related breach ...
Here's a quick condensed overview, which you can use as bullet points in your 2016 budget discussion. Today, successful data breaches happen on a daily basis. The frequency of the attacks ...
Now and then, when I talk to the IT people in larger organizations, they tell me they experience political headwinds in trying to get an awareness program rolled out that includes ...
We recently participated in USA Today's “Cyber Security” campaign that aims to encourage readers to recognize the importance of cyber security in their personal, financial and business ...