Loading...

Follow KnowBe4 Security Awareness Training Blog on Feedspot

Continue with Google
Continue with Facebook
or

Valid

'Biggest ever breach' exposes project to de-anonymize Tor traffic. IF YOU'RE A CONTRACTOR to a government intelligence service, then getting hacked is a really bad look. Especially if the hacking reveals a number of projects that are slyly being worked on.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Bleepingcomputer reported: "Windows Defender is being rebranded to Microsoft Defender to indicate that it now part of a cross platform family of products. This includes enterprise products, which offer solutions for multiple OS platforms.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Our friend Larry Abrams at Bleeping computer warned: "A new extortion scam is underway that pretends to be from a US State Police detective who is willing to delete child porn evidence if you send them $2,000 in Bitcoins. Pretending to be from a state police detective is a new twist, but what really stands out is that they also include a contact phone number that can be used to call the scammer.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

We are excited to announce the availability of KnowBe4’s new localized training interface option for your users! 

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A new Marine Safety Information Bulletin from the U.S. Coast Guard demonstrates that cybercriminals aren’t just after land-based businesses.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Using a mix of identity deception, domain spoofing, credential theft, and bank fraud, scammers are taking advantage of soft targets in the U.K.’s education sector. 
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A recent article in The Next Web showed how AI can magically remove a person or object from a video background as computer algorithms “clips” the person walking across a street out of the video.  The video was created with open source tools but its not perfect. It leaves wobbly lines where the person was deleted from the video. But it will give you an idea of where this technology is and where it is rapidly going.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The Israeli company whose spyware hacked WhatsApp has told buyers its technology can surreptitiously scrape all of an individual’s data from the servers of Apple, Google, Facebook, Amazon and Microsoft, according to people familiar with its sales pitch. 

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Warwick Ashford at ComputerWeekly reported: "Lateral phishing is a growing type of account takeover that has enabled attackers to target more than 100,000 people by hijacking just 154 email accounts.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

New data compiled by the Financial Crimes Enforcement Network (FinCEN) shows that illegal transactions linked to business email compromise (BEC)—aka CEO Fraud— scams averaged $300 million per month last year. The figure is based on suspicious activity reports (SARs) received by FinCEN. In 2018, the organization received close to 14,000 filings.

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview