Arg The Cat O Nine Tails For Careless Clickers
Arg! The Cat O' Nine Tails For Careless Clickers!
Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.
Arg! The Cat O' Nine Tails For Careless Clickers!
Today (Jan 22, 2014) Wall Street Journal reporters Charles Levinson and Danny Yadron had a good summary of the current status of the Target Hack.
David Braue at CSO reported on some very interesting results of the 11th Annual Information Security Trends report by CompTIA: "28 per cent of respondents said information security was a ...
What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a ...
It goes from bad to worse. The initial 40 million turns out to be really 110 million. Apparently the forensics team discovered another 70 million cards exfiltrated. And then the news ...
Websense has posted some interesting new phishing research a few days ago. They started out: "With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of ...
During the Black Friday shopping week, tens of millions of credit and debit card records were "phished" out of Target. The data breach was nationwide, and has extended for as far as ...
Last weekend, 60-minutes had a special about the NSA which spoke out on Snowden and spying. The headline was: "The NSA gives unprecedented access to the agency's HQ and, for the first ...
Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as ...
Personal Health Information of 90,000 patients was accesssed by hackers because an employee opened an infected email attachment early October this year. When will they learn that ...
The revelations are getting wilder by the week. The NSA has its own botnet, they infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive ...
Our friends at MalwareBytes put up a great blog post that explains in detail why you should not just connect to any free Wi-Fi. The risk is that you will connect to a hostile Wi-Fi access ...
Ex-NSA contractor Edward Snowden used user names and passwords that colleagues at a spy base in Hawaii gave him to access some of the classified material he exfiltrated. Around 20-25 ...
Please read this article and then forward it to the head of your legal department or the person in your organization who is responsible for compliance. Recently, the Department of Health ...
Experts warn that cybercriminals are using fake Hong Kong Monetary Authority invoices to distribute a piece of malware. The emails are entitled “Invoice #3404196 – Remit File” and they ...