Experts: Social Engineering Attacks Harder To Stop
Michael Heller at TechTarget wrote a good longish article where he concluded: "As more personal and corporate information is shared on the Web, social engineering techniques and attacks ...
Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.
Michael Heller at TechTarget wrote a good longish article where he concluded: "As more personal and corporate information is shared on the Web, social engineering techniques and attacks ...
Something surprising happened last week. A few of our customers reported that their phish-prone percentage was going up. Up? Yes, up. Not something you normally would expect or ...
Health records are the new credit cards. They have a longer shelf life and are often easier to get. There are more opportunities for fraud. No wonder that bad guys are after them with a ...
Been mystified why end-users do not seem to get it? Their eyes glazing over when a security alert pops up on their screen? Brand new neuroscience research using MRI shows a dramatic drop ...
Here is the disconnect: 82 percent of IT pros think that BYOD in the workplace has “very significantly” or “significantly” increased IT security risks, less than half of organizations ...
Ransomware: Pay Up Or Fight. What Would You Do? Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade ...
Adam Greenberg at SC Magazine reported on something interesting:
A spear-phishing last month at Orange Park City Hall almost got away with $500,000 from the city's bank account. Fortunately it was caught in time so that a wire transfer that already had ...
In a new report, Hacking the Human OS, McAfee (owned by Intel) security researchers Raj Samani and Charles McFarland found that, increasingly, hackers are using social engineering ...
Kaspersky recently reported that 28.8 percent of phishing attacks in 2014 tried to steal financial data from consumers. The results show how cybercrime has shifted its focus to payment ...
More than 100 financial institutions in 30 countries have been the victim of a cyberheist that lasted in some cases almost 2 years. This was not a smash-and-grab but a highly ...
The traditional malicious software detection approach is far from being sufficient, especially in corporate environments. More and more it's found that antivirus products can take months ...
Last updated 2/12/2015 - The foreign hackers who stole up to 80 million records from Anthem social engineered their way into the company's network by obtaining the credentials of five ...
It's a well-known fact that employees are the weakest link in IT security. There is good news though! New research from our friends at Wombat Security Technologies and the Aberdeen Group ...
Organizations defend their networks on each of the six levels in the green graph you see. End-user Internet Security Awareness Training resides in the outer layer: ‘Policies, Procedures, ...
It's the holidays and the bad guys are working overtime. There are three scams you want to warn your users about. Remember the Phil Esterhaus character in Hill Street Blues? To begin ...
Lance Spitzner at the SANS Securing The Human program and I have a lot in common; we evangelize effective security awareness training and we both drive a Tesla. In his 22 December 2014 ...
Following last year’s big announcement of not just Target’s data breach but executive job loss, CSO lays out 9 data breaches resulting in job loss. They compare Target alongside other ...
System admins hold the keys to the kingdom. The NSA is actively hunting for system admin credentials. A popular way to get you to click on something that installs zero-day malware on your ...