Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage

Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world’s largest banks.

The post Why You Should Be Worried About London Blue’s Business Email Compromise Attacks appeared first on Security Intelligence.

Continue reading Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Why You Should Practice and Drill to Prepare for a Cyber Emergency

The U.S. Fire Administration’s five key components of a fire safety education program serve as a useful framework for CISOs looking to boost their company’s ability to respond to a cyber emergency.

The post Why You Should Practice and Drill to Prepare for a Cyber Emergency appeared first on Security Intelligence.

Continue reading Why You Should Practice and Drill to Prepare for a Cyber Emergency

June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

In June’s security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.

The post June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway appeared first on Security Intelligence.

Continue reading June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

Goal! Spam Campaigns Capitalize on the World Cup Craze

IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.

The post Goal! Spam Campaigns Capitalize on the World Cup Craze appeared first on Security Intelligence.

Continue reading Goal! Spam Campaigns Capitalize on the World Cup Craze

Social Engineering: A Trick as Old as Time

Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.

The post Social Engineering: A Trick as Old as Time appeared first on Security Intelligence.

Continue reading Social Engineering: A Trick as Old as Time

February’s Top Cybersecurity News Stories: Nice Phish You Got There

Last month’s cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials’ identity protection habits and more.

The post February’s Top Cybersecurity News Stories: Nice Phish You Got There appeared first on Security Intelligence.

Continue reading February’s Top Cybersecurity News Stories: Nice Phish You Got There

An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot

An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.

The post An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot appeared first on Security Intelligence.

Continue reading An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot