CSO Magazine has a great piece on social engineering/phishing scams. The article quotes both vendors that we resell – Wombat and KnowBe4. Bottom line – the Verizon 2016 data breach report says that 30 percent of the phishing emails were opened compared to 23 percent last year. 12 percent clicked on the link. If 12 […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Leoni makes cables and wiring harnesses for cars, trucks, healthcare systems, appliances and many other products. They operate worldwide, are publicly traded, have 75,000 employees and in 2015 had sales of over 4 billion euros. You would think that a company like this would not fall for a business email compromise scam. But they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the security research community (and me) has been saying for years, the Internet of Things is really an Internet of insecurity and researchers have now demonstrated that in a noisy way. Researchers at the University of Michigan and Microsoft (yes, really, THAT Microsoft) have published a paper that they are going to present at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Network World wrote about an interesting attack that is – at least in this case – very simple to fix. First, what is Pharming. When you go to your browser and type in www. foo.com, you are trusting the browser to actually send you to foo.com. What if it really sent you to badfoo.com? Badfoo.com […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
ars technica reported yesterday on a very sophisticated trojan that has been around, they say, since 2008, went dark in 2011 and came back in 2013. The trojan is comprised of 5 stages, all but the first of which is encrypted and is serially decrypted to avoid detection. The interesting part about it is that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
McAfee Labs reported that 80% of the participants in its online phishing test failed at least one of the seven parts of the test. Combine this with a reported 250,000 new phishing URLs in the last quarter, 1,000,000 in the last year, and think about the likelihood that one of your employees will fall victim […]
Continue reading →
[DISPLAY_ACURAX_ICONS]