Kron

MFA is No Cure for Phishing
Last year my Twitter feed became full of stories and retweets about how Google “solved the phishing problem” using hardware multi-factor authentication (MFA) tokens. One such article covering this topic was “Google: ...

Security Assumptions – Don’t Make an ASS of U and ME
Have you ever stopped to ask yourself if the things you are defending against are really your biggest security problems? I am going to challenge you to think about things a little ...

Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019
Register Now for an Offer You Can’t Refuse! Join Erich Kron of KnowBe4 for a technical foundation of phishing with tools such as Modlishka and SET and how to drastically ramp up ...

Travel Hacking for the Successful InfoSec Pro
So, you want to be a road warrior? Maybe your job has morphed into something where travel is now part of the fun. Or maybe travel is required to reach that InfoSec ...

Credential Phishing – Easy Steps to Stymie Hackers
Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly ...

The Modern Day Hacker – A Cautionary Tale
J0hn_D0ugh$ – So there I was once again enjoying my victory. I wasn’t technically done yet, however all of the hard stuff had already been done. I’m not a hacker just for ...