“Cybercrime Uses Social Engineering Techniques to Steal Employee Credentials and Commit Payroll Diversion.”

When Does Effective Persuasion Become Manipulation? There’s a fine but clear line between ethical and unethical persuasion, says Joe Gray, a security consultant from the “Advanced Persistent Security” blog...

[Heads-up] Two Interesting Things You Want To Know About Right Away

This is the very first time I am giving you...

Microsoft Office Macros Remain Top Choice for Malware Delivery

Microsoft Office documents containing malicious macros accounted for 45 percent of malware loaders in August 2018, according to a blog post by Cofense. These macros were used to deliver a...

It Only Takes One Phish to Spoil Your IPO

The recent data breach of pre-IPO biotech firm Guardant Health shows how much impact a single successful phishing attack can have on an organization. Healthcare and biotech companies hold some pretty...

Looking at Cyber Attacks From the Inside Out, It’s All About Social Engineering

Frances Zelazny, Vice President of BioCatch, gave a recent Tech Republic interview to share some insight into how hackers can access your passwords. It's familiar but worth reviewing, since the...

The Need for Security Champions as Part of Your Security Culture

Security cultures don’t exist within organizations because IT wills them to. With the increase in attacks, organizations need internal advocates for the necessary shift in corporate culture to occur. Just about...

Don’t Pay Hackers Ransom: It Only Encourages Them

Assuming they're not likely targets of cybercrime can be, as we've had occasion to note, a dangerous mistake that they are not targets for cyber attacks is a dangerous mistake...

Social Engineering, Just a Call Away

An email arrives, and you think it’s from your boss. Because it has your boss’s name on it, there's a huge psychological response, and you tend do what is requested....

“Forget Passwords. It’s Time for Passphrases.”

Mr. Henry Williams is a deputy editor for The Wall Street Journal in New York, and he reported on something we just also recommended. Here is an excerpt with a...

A First Look at Cryptomining Attacks

Your organization might just be making someone else money by allowing them to mine for cryptocurrency on your computers… and not even know it. At the end of the day, cybercriminals...

LATEST NEWS

MUST READ