Tag Archives: Security Awareness

Security Awareness Memes

Posted in Security Blog | Tagged , , , | Comments Off on Security Awareness Memes

Business Email Compromise Leads to $737,000 Transfer to China

The FBI classifies “phishing that leads to loss” as Business Email Compromise (BEC). In a recently released story that closely matches the BEC hack in Omaha I wrote about back in February, another company fell victim to a spearphishing attack … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Business Email Compromise Leads to $737,000 Transfer to China

SpearPhish Your Phamily and Phriends!

I tried InfoSec Institute’s Phishing service, and here is how it played out! Over the past couple of days, while having some discussions regarding social engineering at work, I stumbled across this service. The InfoSec Institute provides phishing as a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on SpearPhish Your Phamily and Phriends!

Your Data From Ashley Madison Was Leaked

A new phishing scam, to out cheaters, is being played out by bad actors. A phishing scam like the one below is being sent in mass in both phishing and spear phishing. Unfortunately, your data was leaked in the recent … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Your Data From Ashley Madison Was Leaked

Phishing and Vishing Attacks are Up

With the recent OPM hack… I use hack loosely because of this. A lot of Personally Identifiable Information (PII) was stolen. About 32 million records. The PII consisted of Names, Addresses, Social Security Numbers, Dates of Birth, places one lived … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing and Vishing Attacks are Up

Vishing Voicemail? Sounds Serious!

I got a voicemail yesterday on my Google Voice number, a number I haven’t used in a year. Vishing is voice phishing, a category of social engineering and the act of using the telephone in an attempt to scam a … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Vishing Voicemail? Sounds Serious!

How Social Engineering Affected Tesla

In totally uncool moves, two Tesla owned accounts were hijacked via social engineering: A bad guy called AT&T customer support and pretended to be a Tesla employee. This person then demanded all phone calls to the company be forwarded to a … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on How Social Engineering Affected Tesla

Seven Deadly Employee Sins – How Companies Get Compromised

The average person thinks that companies get hacked by super hackers with amazing knowledge on computer systems and can break encryption by staring at jumbled code like John Forbes Nash Jr. in the movie, A Beautiful Mind. It may be … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Seven Deadly Employee Sins – How Companies Get Compromised

Social Engineering Fraud Videos

Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Social Engineering Fraud Videos

Five Habits to be Unhackable

By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Five Habits to be Unhackable