Social Engineering Exploit Fools HR with Infected IT Resumes
Researchers recently detected a clever email-based attack that combines phishing and social engineering techniques in order to trick users into opening a malicious document. In this ...
Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.
Researchers recently detected a clever email-based attack that combines phishing and social engineering techniques in order to trick users into opening a malicious document. In this ...
The Payment Card Industry Council thinks Security Awareness Training is so important that they just published a 25-page guidance paper that fully explains the why, how and what of ...
The Avast Blog reports a new "password stealer" feature in the Reveton ransomware. Reveton is the type of "police" lock/screen ransomware which falsely alerts users they've broken some ...
When your products get targeted with custom made ransomware, you know you've got it made. We're talking about NAS (network-attached storage) built by Synology in Taiwan. the malware has ...
The Govinfosecurity site just reported on some very interesting scientific research that finds so-called "embedded training" is ineffective. Let's quickly define "embedded", they chose ...
Please read this article and then forward it to the head of your legal department or the person in your organization who is responsible for compliance. Recently, the Department of Health ...
FBI’s Internet Crime Complaint Center Ransomware
Antony Savvas at Computerworld UK had a good write-up about this quite interesting news: "Some 91% of cyberattacks begin with a "spear phishing" email, according to research from security ...
[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...
A few days ago I wrote about a 60 million Euro cyberheist. I have been digging into this a bit more, as it's the most advanced attack yet. Cybercrime is not revolutionary, it clearly ...
More from Brian Krebs's astounding blog post today. "As the chart I compiled above indicates, attackers are switching the lure or spoofed brand quite often, but popular choices include ...
The fake cashier's check scam has gotten more sophisticated. Cathy Bussewitz at the pressdemocrat site reported on this one: "It usually starts when a seller posts a big-ticket item on ...
F-Secure the security company based in Finland has recently cautioned that spam mails themed on the Olympics are targeting Internauts while carrying web-links to one malevolent PDF file ...
"People over the age of 55 pick passwords double the strength of those chosen by people under 25 years old. That's according to the largest ever study of password security, which also ...
TrendLabs discovered a malicious MS PowerPoint document that arrives attached to email messages. The file contains an embedded Flash file, which exploits a software bug found in specific ...
Un-friggin-believable but true. Don't be one of them! Gregg Keizer at ComputerWorld was the first with this story. "Nearly a fifth of Windows PCs in the U.S. lack any active security ...
GFI is one of the few antivirus vendors that understands the importance of prevention and end-user training. They produced this useful video that in two minutes illustrates the top 5 ...