December 14, 2021
Via: Help Net SecurityCreated by cybersecurity experts, behavioral scientists, and interaction designers, the Human Risk Assessment for Enterprise released by AwareGO continuously observes top human attack vectors, identifies vulnerable departments and roles, and offers actionable insights to create informed security strategies to improve […]
February 1, 2019
Via: Help Net SecurityAccount takeover-based (ATO) attacks now comprise 20 percent of advanced email attacks, according to Agari’s Q1 2019 Email Fraud & Identity Deception Trends report. ATO attacks are dangerous because they are more difficult to detect than traditional attacks – compromised […]
January 31, 2019
Via: Hot for SecurityAircraft manufacturer Airbus is investigating a security breach that has seen hackers steal personal information from its systems. In a statement published on its website, Airbus admitted that systems used by its commercial aircraft business had been accessed by an […]
December 19, 2018
Via: Security WeekSocial security numbers and other personal information belonging to employees of the U.S. National Aeronautics and Space Administration (NASA) may have been stolen after at least one of the agency’s servers was breached. In a message obtained by SpaceRef, NASA […]
Mobile security, Network security
November 29, 2016
Via: Panda SecurityAs we enter the Christmas period, many of your company’s employees will be deciding to change their phones in the coming months. Something as simple and seemingly harmless as a gift (or a purchase from the Black Friday sales) could […]
October 28, 2016
Via: The HillNuclear power plants, chemical plants, defense contractors and other highly sensitive industries and workers are leaking information through their pagers, a new report shows. Pagers have been out of vogue with the public since the rise of the cellphone but are […]
Editorial, Network security, Virus & Malware
October 12, 2016
Via: Russel EdwardsAlarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose […]
October 10, 2016
Via: CIOAs more connected devices are used to get business done remotely and in the office, IT leaders are challenged with keeping those devices secure. Practicing these safety tips will help their users become better online citizens. Keep Patches Up to […]
September 22, 2016
Via: CSO OnlineYou’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been warned about for years. It’s enough […]
Network security, Privacy protection
September 16, 2016
Via: CSO OnlineSecurity awareness training is one of the most effective ways to strengthen what is generally known as “the weakest link in the security chain.” The key is to make employees skeptical without paralyzing them with paranoia. Security experts agree that […]
Cyber warfare, Editorial, Privacy protection
September 15, 2016
Via: Russel EdwardsWhat should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational […]
September 13, 2016
Via: InfoWorldA tough-to-detect malware that attacks government and corporate computers has been upgraded, making it more aggressive in its mission to steal sensitive files, according to security firm InfoArmor. Last November, InfoArmor published details on GovRAT, a sophisticated piece of malware […]
August 9, 2016
Via: CSO OnlinePokemon Go has become a social icon. It is the subject of major news stories, the butt of many jokes, and has lately become a foundation for many vendors equating the game to their own gamification efforts. Most people do […]
July 28, 2016
Via: Security WeekPhishMe, a company that helps organizations teach security awareness by educating employees on how to identify phishing attacks, today announced it has raised a whopping $42.5 million in funding. The company previously raised $2.5 million in July 2012 in a […]
July 11, 2016
Via: Dark ReadingThe prevailing security wisdom to “trust but verify” comes from a deep well of painful experience. The fact is that there are always a few bad apples in the barrel, and when it comes to employees–whether IT or your typical […]
Threats & Malware, Vulnerabilities
May 24, 2016
Via: Help Net SecurityWhile employee-related security risks are the number-one concern for security professionals, organizations are not taking adequate steps to prevent negligent employee behavior, according to a new Ponemon Institute study. The study, Managing Insider Risk Through Training & Culture, asked more […]
May 11, 2016
Via: Naked SecurityGoogle employees’ personal details have been spilled by a vendor who handles the company’s benefits management. Somebody working at the third-party vendor accidentally breached the employees’ information by sending an email with sensitive data to a benefits manager at another […]
February 8, 2016
Via: CSO OnlineOn Sunday, an account on Twitter posted a Department of Homeland Security staff directory with 9,355 names. Shortly after the DHS data was posted, the account went on to claim that an additional data dump focused on 20,000 FBI employees […]
Access control, Identity theft
January 12, 2016
Via: Help Net SecurityIn a perfect world, security professionals would see a few alerts, recognize the pattern, identify the malware and the hacker, and solve the problem – all with only a few mouse clicks. However, no matter how seasoned and deep security […]
December 4, 2015
Via: Help Net SecurityCustomers’ personal and financial data is being put at risk as many industry personnel are not assigned unique login and password details, new research from IS Decisions has revealed. 29% of finance personnel do not have unique user logins – […]