Insider Threats – Recognize and Respond to the Risk Within

Ninety percent of organizations feel vulnerable to insider threats.  That alarming statistic was recently published in the annual Insider Threat Report released by Crowd Research Partners. The survey respondents are almost equally worried about malicious insiders (47%) as they are accidental insiders (51%). What is one of the main enabling risk factors? Too many users The post Insider Threats – Recognize and Respond to the Risk Within appeared first on Security Through Education.
Read more

Online security tips for Valentine’s Day: how to beat the cheats

Love is in the air, and so are the hopes of scammers wanting to make a quick buck at your expense. Shore up your digital defenses this Valentine's Day with a look at some of the common problem areas. Categories: Cybercrime Social engineering Tags: datinggeotaggpsmoneyphotosscammersscamsswipevalentine's day (Read more...) The post Online security tips for Valentine’s Day: how to beat the cheats appeared first on Malwarebytes Labs.
Read more

Panic attack: Apple scams apply pressure

We take a look at some of the many vaguely threatening/panic-inducing attempts by Apple scams to phish potential victims. Featuring emails, texts, and...Edward Snowden?! Categories: Cybercrime Social engineering Tags: AppleApple ScamsApple Supportipoditunesphishphishingscam (Read more...) The post Panic attack: Apple scams apply pressure appeared first on Malwarebytes Labs.
Read more

Ep. 102 – Penning the Future with JJ Green

I don’t think any of you will be shocked when i say this world is increasingly more insecure. From our online persona to our physical security – everything is in danger. This month JJ Green tackles that topic with us. Feb 12, 2018 Contents Download Get Involved Download Ep. 102 – Penning the Future with The post Ep. 102 – Penning the Future with JJ Green appeared first on Security Through Education.
Read more

Social-Engineer Newsletter Vol 08 – Issue 101

  Vol 08 Issue 101 February 2018 In This Issue Social Engineering Your Life: Vishing, Phishing and Impersonation Advice for Daily Use Social-Engineer News Upcoming classes As a member of the newsletter you have the option to OPT-IN for special offers. You can click here to do that. Check out the schedule of upcoming training The post Social-Engineer Newsletter Vol 08 – Issue 101 appeared first on Security Through Education.
Read more

Boomerang spam bombs Malwarebytes forum—not a smart move

Boomerang Tech solutions had trouble configuring their spambots, thus dropping a few spam bombs on Malwarebytes forums. Watch us catch them red-handed in a scammer call. Categories: Cybercrime Social engineering Tags: BoomerangforumsMBAMspamTSS (Read more...) The post Boomerang spam bombs Malwarebytes forum—not a smart move appeared first on Malwarebytes Labs.
Read more

Five Things You’re Doing That are Compromising Your Online Safety

Just like we work to improve our physical health and well-being, it’s also vitally important to improve our cyber health and keep ourselves safe from online danger. Here are five easy fixes to keep yourself cyber safe this year: 1. What You’re Doing: Clicking in Emails What You Should Be Doing Instead: Never click on The post Five Things You’re Doing That are Compromising Your Online Safety appeared first on TechSpective.
Read more

Stolen security logos used to falsely endorse PUPs

To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not. Categories: 101 Social engineering Tags: logosMcAfeemicrosoftmisleadingnortonPieter ArntzPUPs (Read more...) The post Stolen security logos used to falsely endorse PUPs appeared first on Malwarebytes Labs.
Read more

“Who visits your Twitter profile” spam app brings week of chaos

Last week saw a Twitter spam app claiming to show who "viewed your profile" and spreading throughout the social media platform. See how it spread, and what you can do to avoid being caught by this common scam. Categories: Cybercrime Social engineering Tags: applicationsappsscamsocial mediaspamspreadtwitter (Read more...) The post “Who visits your Twitter profile” spam app brings week of chaos appeared first on Malwarebytes Labs.
Read more
Page 1 of 1012345...10...Last »