Security Awareness Training Blog

Social Engineering Blog

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

Georgia Tech Researchers Try To Stop Spear-phishing

Georgia Tech correctly identified that the most challenging threat facing corporate networks today is “spear phishing.” “Spear phishing is the most popular way to get into a corporate ...
Continue Reading

Osterman Blogs About KnowBe4

Highly regarded IT Analyst Mike Osterman wrote: "Most will agree that despite the enormous amounts spent on secure Web gateways, anti-virus software, cloud-based malware filtering and the ...
Continue Reading

PDF 0-day Vulnerability Being Exploited In The Wild

Last week, Adobe warned customers that a few new exploits that target Acrobat Reader were being exploited in the wild. Keep an eye out for patches that are expected soon. The exploits are ...
Continue Reading

Which Antivirus Has The Best Phishing Protection? Surprise!

I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...
Continue Reading

Feb SANS Monthly Awareness Video

You may be familiar with our friends at SANS. For their 'Securing The Human' team, every month is security awareness month, same as here at KnowBe4. On the first of every month they post ...
Continue Reading

Fake Apple Invoices

Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...
Continue Reading

Facebook Scams You Need To Watch Out For

Facebook is loved far and wide by scammers. It's a great pool of an almost unlimited amount of victims, most of whom are gullible enough to fall for the most simple scams. Shooting fish ...
Continue Reading

Upper Management Often Ignores IT Security Policy

Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company called Cryptzone who interviewed 300 IT Security ...
Continue Reading

Facebook Graph Search Is Social Engineering Bonanza

Zuck has come out with something new, and you always need to watch it when that happens. It's a combination of big data and social networking so that people can easily find new friends, ...
Continue Reading

How to Address Securitys Weakest Link

User Awareness Tops Security Leaders' List of Challenges Tom Field over at the Healthcare Infosecurity Site nails it:" Heading into 2013, security leaders across industry feel confident ...
Continue Reading

Here Are Your 13 Predictions For 2013

Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...
Continue Reading

One phishing email exposes millions of people to data theft in South Carolina cyberattack

NBC News reported: COLUMBIA, S.C. -- A single malicious email sent to workers at the South Carolina Department of Revenue last August enabled an international hacker to crack into state ...
Continue Reading

The TOP 10 BYOD Gotchas

Did you know? On any given day across the globe, the number of iPhones sold will exceed the number of babies born (378,000 to 371,000) The problem is that mobile device security has not ...
Continue Reading

Why We Are Doing This

Some of you might remember Sunbelt Software, which from 1996 to 2010 sold system admin and security tools for Windows Server. I am one of the two co-founders of Sunbelt. After ...
Continue Reading

What Is The Top Phishing Day Of The Week? And Why?

[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...
Continue Reading

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...
Continue Reading

Scam Of The Week You Have Been Targeted For Assasination

The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...
Continue Reading

Beware Of iPhone Delivery Phishes

Hackers have a great new reason to send you a UPS notification regarding your new iPhone 5 shipment. In times like this – when people are eagerly waiting for an email of this type – the ...
Continue Reading

I was quoted on CNNMoney re mobile security

[caption id="" align="alignleft" width="230" caption="Mobile Security"][/caption] NEW YORK (CNNMoney) -- Security experts have warned for years that our smartphones are due for a major ...
Continue Reading

Scam Alert: Naked Prince Harry Pictures

[caption id="" align="alignleft" width="175" caption="Scam Alert: Naked Prince Harry Pictures"][/caption] Wath out for the latest Internet craze. The bad guys are having a field day with ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews