Just in case anyone forgot, spear phishing works, and bad things happen.
South Korea is the latest to join the “compromised by spear phishing” list, suffering very serious attacks from their not-so-friendly northern neighbor. What’s interesting to me is that South Koreans...
View ArticleFighting cybercrime for real? You CAN’T rely on single security control.
Cyber-Attacks on Infrastructure Firms Highlight Need for New Defenses – That’s the title of an article by Robert Lemos posted on eWeek a couple days ago, and every clear-thinking security professional...
View ArticlePhishland: How will your users survive the Phishpocalypse?
Everyone loves the movie Zombieland. It’s a romantic classic — about surviving the zombie apocalypse: boy meets girl, girl gets bit by zombie and tries to kill boy. Boy meets new girl, and then boy...
View ArticleFor Spear Phishing Defense a Little Skepticism Goes a Long Way
A recent Fox Business article quoting Larry Hurtado from Digital Defense caught my attention today, mostly because the #1 item on his list of advice is to “Be skeptical”. In Larry’s words: “The first...
View ArticleWhat the 2013 Verizon Data Breach Report tells us about phishing
When I was a kid I’d thumb through my parents’ Newsweek magazines for cool graphics that explained a complex geopolitical or economic issue. If you saw my post about the Phishpocalypse, you might have...
View ArticleTwitter Security Memo Reinforces Reality of Spear Phishing
Lots of press this week related to Twitter’s security memo sent to media companies (CNET Video here). Long story short? Spear phishing works and you will be a victim if you ignore this threat. Before...
View ArticleWebsense test validates our top concern: Train your users to spot phishing...
Props to Websense for this excellent phishing test, Operation Spearphish Challenge. It’s an ideal way to validate why you need to train users on how to identify phishing messages. Click here to test...
View ArticleC-Level Execs Are Targets for Spear Phishing
Recent article on CSO-Australia talking about how C-level executives are prone to click on phishing emails. Why? Executives like other employees are conditioned to be highly responsive on email....
View ArticleClassic Reruns: Attack against CNN, Time, and Washington Post used phishing...
A lot of resurrected TV shows just aren’t the same as the original. The producers try to do something new, shinny, slick, edgy. And they fail. The new Knight Rider series lasted one season. Why try to...
View ArticleThe 2013 ThreatSim State of The Phish
We are pleased to announce the 2013 ThreatSim State of The Phish. Phishing continues to be one of the most effective attack vectors in the attacker’s tool kit. A significant percentage of documented...
View Article
More Pages to Explore .....