Phishing Attacks See Massive Increases and Improvements in Execution with Social Engineering at the Helm

Management Consulting, Training, Uncategorized
With 98% of malicious emails that hit inboxes containing no malware, the evolution and future of the phish lies squarely in the hands of effective social engineering. If you were a cybercriminal and were planning on using email as the medium by which to carry out your evil plans, you quickly realize you need to fool the recipient no matter what – whether the desired action is to open a malicious attachment, click a link, or respond, you much con them into doing so. Read more
Read More

Cybercrime could cost companies trillions over the next five years

Uncategorized
A new report (PDF) by Accenture indicates that over the next 5 years, cyberattacks could result in global costs totaling $5.2 trillion. That amount includes both lost revenue for companies and the expenses businesses are likely to incur due to attacks. The high costs have to do with the growth of the digital economy and the poor cybersecurity controls applying to new technologies.  Based on the survey of around 1,700 C-suite members from across the globe, Accenture claims that “Internet security is lagging behind the sophistication of cybercriminals and is leading to an erosion of trust in the digital economy”. Read More...
Read More

[Heads-up!] New ‘Anatova’ Ransomware Disguised As A Game. Warn Your Users

Uncategorized
The ransomware strain was discovered in a private peer-to-peer (p2p) network and targets consumers by using the icon of a game or application to trick the user into downloading it. McAfee researchers today announced the discovery of a new ransomware family, “Anatova” that is targeting consumers at scale across the globe. The ransomware was discovered in a private peer-to-peer (p2p) network and targets consumers by using the icon of a game or application to trick the user into downloading it. Christiaan Beek, Lead Scientist & Principle Engineer at McAfee said, “Creating a quick and fast piece of ransomware is fairly easy for those with basic know-how. Ransomware packed with functionality that is also difficult to analyze, such as Anatova, is more difficult to create from scratch. Anatova has the potential to become…
Read More

New Data Suggests that Negligent Employees May Be the Reason Data Breaches are So Successful

Training, Uncategorized
When it comes to root causes of data breaches, it’s not your firewall, your endpoint protection, your antivirus, nor your patching that’s failing you; it’s your employees. Every security-minded organisation puts together a layered security strategy to deter, detect, and respond to cyber attack. A ton of time, budget, and resources is put into software solutions designed to keep up with the latest attacks, malware, and techniques. But what if I told you that your weakest link hasn’t been addressed? Click here to check the fully story out...
Read More