NITSIG Cyber Security Awareness Guide 2018

By Jim Henderson | Produced By: National Insider Threat SIG

Roll back time when users click on a bad link with our new free tool, Second Chance!

Wouldn't it be great if your users had a way to "roll back time" when they forgot to think before they click on a bad link? Now they can!

An analysis of 120 mobile app stores uncovers plethora of malicious apps

RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most …

Pentagon data leak: Massive trove of global social media data left accidentally exposed online

The data exposed included social media posts made by people across the globe, including the US.<p>The Pentagon accidentally exposed classified US …

Surveillance Cameras Made by China Are Hanging All Over the U.S.

Company 42%-owned by the Chinese government sold devices that monitor U.S. Army base, Memphis streets, sparking concerns about cybersecurity<p>The Memphis police use the surveillance cameras to scan the streets for crime. The U.S. Army uses them to monitor a base in Missouri. Consumer models hang in …

China

Dark Web Marketplace Offers Remote Access to Corporate PCs for $3-15 Each

Flashpoint researchers report that Dark Web marketplaces selling access to compromised Remote Desktop Protocol (RDP) servers have become increasingly …

Ransomware Sales on the Dark Web Surged by 2,502 Percent in the Past Year

The past year saw a 2,502 percent increase in sales of ransomware on the dark Web, from just under $250,000 to more than $6.2 million, according to a …

Does Windows 10's Security Boost Make Antivirus Obsolete?

Microsoft Windows Defender Security Center gets new features with the Fall Creators Update, but the best third-party antivirus tools are still better.<p>…

Malware

How Humans (and Machines) Can Help Fight Phishing

How Humans (and Machines) Can Help Fight PhishingWhen it comes to battling cyber-attacks, many starting as phishing emails, we’re naturally inclined …

Massive 711 Million Emails and Passwords Dumped and You Are Probably on the List…I was

A malware researcher going by the Twitter handle, Benkow moʞuƎq, has uncovered a huge stash of emails and passwords stored on an open server in The …

What is a fileless attack? How hackers invade systems without installing software

"We see it every day," says Steven Lentz, CSO at Samsung Research America. "Something coming through, some exploit type, unknown ransomware. We've …

Information Security

Report: Negligent employees are no. 1 cause of cybersecurity breaches at SMBs

Careless workers and poor passwords have led to a rise in ransomware attacks and other breaches on SMBs, which cost an average of $1 …

Cybersecurity

Hundreds of privacy-invading apps are using ultrasonic sounds to track you

Apps are using ad-tracking audio signals that your phone can hear, but you can't.<p>A new privacy-busting technique that tracks consumers through the …

Privacy

Equifax Says Cyberattack May Have Affected 143 Million in the U.S.

Equifax, one of the three major consumer credit reporting agencies, said on Thursday that hackers had gained access to company data that potentially compromised sensitive information for 143 million American consumers, including Social Security numbers and driver’s license numbers.<p>The attack on the …

Identity Theft

Canadian university scammed out of $11.8 million

MacEwan University in Edmonton, Alberta, is the latest confirmed victim of scammers. “On Wednesday, August 23, MacEwan University discovered it had …

Security

Locky Returns via Spam and Dropbox-Themed Phishing Attacks

<b>Massive Ransomware Campaign Flings 23 Million Emails in Just 24 Hours</b><br>A massive Locky ransomware campaign has been infecting devices via malware-laced …

Information Security

100% of government IT workers said employees are biggest threat to cybersecurity

Only 14% of government organizations consider themselves to be well-protected against cyber threats, according to a report from Netwrix. Here's …

Cybersecurity

How Endpoint Security Can Help Secure the Human

Hackers use a wide variety of tactics to enter networks and often that means finding a human to dupe.

Cybersecurity

New Study: Phishing Is Still The Top Threat Faced By Organizations

The new 2017 SANS Threat Landscape survey from the well-known research and education specialist finds that security professionals rate phishing at 72 …

Phishing

Inside the New York hospital hackers took down for 6 weeks

Almost all U.S. health care organizations have reported at least one cyberattack

Health Care

Techniques for Dealing with Ransomware, Business Email Compromise and Spearphishing

Ransomware alone cost organizations an estimated $1 billion in 2016, up from $24 million in 2015 and there is no end in sight for 2017! Ransomware, …

Security

Hackers impersonate women online to get into target corporate networks

By all (online) accounts, Mia Ash was a pretty and successful photographer based in London, and she was looking for friendship and love on the …

Security

Every organization is only one click away from a potential compromise

Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with …

Cybersecurity

Outsider or Insider: Who Will Cause Today's Data Breach?

In today’s cybercrime landscape, threats come not only from all sides, but also from within. In its annual Threat Intelligence Index, IBM X-Force …

Cybersecurity

What is a 'smishing' scam?

Phishing and Social Engineering Cause Over Half of Cyber Incidents

Phishing and Social Engineering Cause Over Half of Cyber IncidentsThe Business Continuity Institute (BCI) has called for improved user education and …

Windows 10 to Get Built-in Protection Against Most Ransomware Attacks

Ransomware Ransomware Everywhere Not a Single Place to Hide! But, Microsoft has a simple solution to this problem to protect millions of its users …

Phishing Examples: Even the Security Folks Get Targeted...Again!

Phishing

How to make your employees care about cybersecurity: 10 tips

People are the largest security vulnerability in any organization. Here's some expert advice on how to make cybersecurity training more effective and …

Cybersecurity

Spot the Phish Quiz

First Name<p>Last Name<p>Nickname<p>Your nickname will be shown in a public, online leaderboard. Do not include any information that you do not want to be …