bridging the gap between technology and the people who use it


Security Awareness Training

Your Company Data is at Risk
User activity represents the highest level of risk in most organizations. Security appliances alone are insufficient to protect data. Today’s connected companies need a comprehensive security plan that includes user awareness training.

 

Why Awareness in Needed
11% of Computers Worldwide are part of an existing botnet
23% of home computers are infected with malware
72% of corporate networks with 100+ computers are infected
28% of security incidents were from stolen hardware
25 million new strains of malware were created in 2009

Automated attacks are the new norm

 

Training That Works

Live training with real life examples that will engage your team.

Training can also be tailored to your corporate environment.

 

Click here for Brochure


Getting Results
DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, according to a recent survey from Arbor Networks. New analysis from Frost & Sull read more ...
The Cloud Security Alliance (CSA) Top Threats Working Group released at RSA Conference an important new research report about cloud computing threats, developed to serve as an up-to-date guide to help cloud users and pro read more ...
A new fileless ransomware family has been discovered, which abuses Windows’ PowerShell for nefarious activities, a novel approach to ransomware, Carbon Black researchers warn. Dubbed PowerWare, this piece of malware is read more ...
Cybercriminals in different hemispheres of the globe are working together to improve malicious tools, software, and techniques used to carry out cyberattacks, researchers have warned. An investigation by Kaspersky Lab f read more ...
Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online platforms, communities, and marketplaces where read more ...
CIO - Last month, National Football League special investigator Ted Wells delivered a shocking report about Miami Dolphins player   Richie Incognito's bullying tactics aimed at teammate Jonathan Martin. At the heart of t read more ...
CSO - University researchers have developed a technique that governments and Internet service providers could use to bypass secured   Internet connections and gather valuable personal information. The "analysis attack read more ...
Note from Fred: Make sure you keep your home router current with the most recent patches. Also, make sure you have changed the default password. IDG News Service - A group of attackers managed to compromise 300,000 ho read more ...
IDG News Service - A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes   it significantly harder to remove, according to security researchers from Sop read more ...
British researchers have created a computer virus that they say is the first to spread like a real airborne contagion. Chameleon can spread through densely populated areas like the common cold, the University of Liver read more ...
Adobe Systems and Microsoft on Thursday issued patches with emergency measures for critical vulnerabilities in Flash and Internet Explorer. Microsoft, which usually fixes security problems once a month on Tuesdays, di read more ...
The crowd-funding site Kickstarter has been Hacked! The company suggested to its users to change their password. The popular crowd funding website Kickstarter is the lastest victim of a data breach. All users are invi read more ...
Adobe today released an emergency patch for a vulnerability that is currently actively exploited. The patch addresses CVE-2014-0497. [1] The address affects all Windows, OS X and Linux. for Windows/OS X, the current v read more ...
There was a good article about the Nest family of products on InfoSec Island's site.  Well, Nest is not much of a family with only 2 products, but there will be more coming. What are the implications to your safety and p read more ...
Looking for a reliable security app for your Android device? AV-Test recently checked out 30 different apps, awarding many of them good grades. The January 2014 report lists all the apps included in AV-Test's analysis read more ...
If you plopped down the plastic at arts and crafts store Michaels recently, you might want to check your statement. The company said Saturday that it was investigating a potential payment-card security breach, a la th read more ...
GoDaddy has acknowledged that one of its employees fell victim to a social engineering attack allowing a hacker to take over a customer's domain names and eventually extort a coveted Twitter user name from him. PayPal, w read more ...
What started out as a problem with one router is turning into a much larger problem.  It started with the Linksys WAG200G, but now more impacted routers are being discovered.  The problem is there is a vulnerability that read more ...
A vulnerability appeared in old d-link routers which allows the attacker to gain admin privileges in the router. The following models are affected: DIR-100 DI-524 DI-524UP DI-604S DI-604UP DI-604+ TM-G524 read more ...
Attack code that exploits an unpatched vulnerability found in all supported versions of Internet Explorer has been released into the wild. This means that cyber attacks could now surge and affect Internet Explorer users. read more ...
Yahoo users who got recycled account IDs said they've found a security risk -- they are receiving emails containing the personal information of former account owners, InformationWeek.com reported Tuesday. The users to read more ...
A Virginia Tech official Tuesday blamed human error for a data breach that may have exposed sensitive data on about 145,000 people who applied online for jobs at the school over the past 10 years. The compromised data read more ...
A day after the iPhone 5S hit the streets, a group of hackers in Germany said they have bypassed the biometric security on Apple's new Touch ID fingerprint sensor by using "easy everyday means." The Chaos Computer Clu read more ...
The iPhone 5S won't hit the streets until tomorrow, but there's already more than $16,000 in cash offered to the first person to hack its Touch ID fingerprint sensor. IsTouchIDhackedyet.com is the brainchild of Nick D read more ...
A critical weakness in Android leaves digital wallets on the mobile platform vulnerable to theft, Bitcoin developers warned Sunday. The vulnerability occurs in an Android component that generates secure random numbers read more ...
LAS VEGAS -- More major brand-name Wi-Fi router vulnerabilities continue to be discovered, and continue to go unpatched, a security researcher has revealed at Defcon 21. Jake Holcomb, a security researcher at the Balt read more ...
Facebook is alerting 6 million of its users that their e-mails or phone numbers were inadvertently shared with other members. The social network said Friday that it has discovered and patched a bug in its "Download Yo read more ...
Facebook's shadow profile data collection activities came to light Friday when the social network disclosed a bug fix. The security researchers who found the vulnerability, Packet Storm Security, say Facebook is compi read more ...
If you're thinking about encrypting email in light of revelations about U.S. government spying, you may be wasting your time. Recent leaks about surveillance efforts by the secretive National Security Agency have spar read more ...
Heard of the game Bad Pigs? Or is it Bad Piggies? Some clever hacker decided to create a malicious app deceivingly similar to one of the top games in the Google Play store. And, it was downloaded more than 10,000 time read more ...
Evernote, the popular note-taking app available on the Web and on mobile devices, has some new security features. The company announced the new features on its blog on Thursday, saying that it's now offering three sec read more ...
F-secure is reporting on new malware found for OS X, which appears to be a backdoor application that so far is known to take screenshots of the user's computer and then attempt to upload them to remote servers. The malwa read more ...
Microsoft has issued a warning that a new piece of malware masquerading as a Google Chrome extension and Firefox add-on is making the rounds, threatening to hijack Facebook accounts First detected in Brazil, Trojan:JS read more ...
PC World - For years now I've harangued relatives about their shoddy password practices. Either they use easily hacked passwords or forget   the passwords they've created--sometimes both. If you won't take it from me, read more ...
The U.S. Federal Bureau of Investigation is able read your emails, Facebook chats, Twitter messages and other private documents without the need for a search warrant, according to its own guidance. The bureau insists read more ...
Yet another company has fallen victim to a hack, with attackers breaking into systems at Evernote, maker of a Web-based note-taking application used by about 50 million people. The company said in a security notice th read more ...
Twitter has just reported that earlier this week, it was a victim of a successful compromise of its systems, resulting in the "limited access" to user information, including usernames, email addresses, session tokens, an read more ...
A couple of Android apps masquerading as cleanup tools actually had a sneakier mission in mind. Uncovered last month by Kaspersky, two apps named Superclean and DroidCleaner posed as software that claimed to clean up read more ...
LAS VEGAS -- The future of privacy and the cloud occupied a sidestage at CES 2013 this morning, with one panelist comparing privacy lost to something else that can't be replaced. "Getting your privacy back is like get read more ...
A Nationwide Mutual Insurance data breach that took place on October 3 apparently affected over a million Americans. The company reported to the North Carolina Attorney General that 1.1 million American customers may read more ...
NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information   on a "large" number of people was recently stolen. Agency employees were told of the Octob read more ...
Cybercriminals gangs are creating a surge in ransomware, says a new report from Symantec. Ransomware is a type of malware best described as an online extortion racket. Malware locks or disables your PC in some way and read more ...
Be sure to double check that Groupon you received in your e-mail -- spammers are using the popularity of e-mailed advertisements for group discount deals to send more malware. The rise of malware through fake e-mail a read more ...
If you get a direct message on Twitter telling you to click a link to watch a video of President Barack Obama punching a guy, don't do it. Spammers are using the idea of the president retaliating against someone for c read more ...
Miscreants have reportedly discovered a zero-day vulnerability in latest version of Adobe Reader. Exploits based on the vulnerability, which circumvents sandbox protection technology incorporated into Adobe X and Adob read more ...
Google's new app scanner in Android 4.2 Jelly Bean moves the platform closer to Apple's model of vetting software before it   is made available to mobile device users, a security expert says. Google isn't expected to read more ...
Cybercriminals don't waste much time these days. Keep on top of trends and significant events, whether it is PayPal's changing terms and conditions, an overdue student loan or the launch of a new tech product -- any h read more ...
Name and email addresses of Facebook users are available online at prices as low as $5 per million. The dodgy trade was uncovered by Bogomil Shopov, an internet marketeer and blogger in the Czech Republic. Shopov said read more ...
Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence   of tampering with the devices at 63 of its stores in eight states. It a statement read more ...
Despite the vulnerability presented by weak passwords, many Internet users continue to put their security at risk by using common words or number sequences that are easily guessable. Unchanged from last year, the thre read more ...
I was looking through my spam folder today and saw an interesting phish.  The phishing email is looking for email account information.  Nothing new about that, except this one seemed to have a broad target range.  Normal read more ...
Security researchers from Avast have intercepted a currently spreading Darkbot malware campaign, that's affecting millions of Skype users. The malware spreads by messaging all of your contacts with a bogus "new profil read more ...
In 1947, Harry Truman wanted Congress to vote for $400 million in aid to support Greece and Turkey against the threat of communist takeover. That was a lot of money back then. What's more, Truman had to win over a Rep read more ...
As mobile malware increases at break-neck speed, the U.S. government wants to be sure users are aware of its dangers. The Internet Crime Complaint Center (IC3), which is a government task force that includes the FBI, iss read more ...
From a blog: I have been telling people for years (both professionally and personally) that anything you put into digital format can be easily stolen from you.  Music, pictures, your masters thesis... anything! In read more ...
In our first half (1H) of 2012 Advanced Threat Report, we looked at various factors related to email-based attack trends, including exploit vector type (e.g., link/attachment), domain frequency, and attachment polymo read more ...
Microsoft is urging users of its Internet Explorer Web browser to download a temporary patch to prevent hackers from possibly taking control of their PCs. The company posted a security advisory late in the day Sept. 1 read more ...
A federal judge in Illinois has ruled that intercepting traffic on unencrypted WiFi networks is not wiretapping. The decision runs counter to a 2011 decision that suggested Google may have violated the law when its Stree read more ...
Millions of US voters could be downloading smartphone apps created to promote the campaigns of President Obama and his Republican   election rival Mitt Romney without noticing the intrusive permissions demanded by the so read more ...
Microsoft yesterday warned Windows users of possible "man-in-the-middle" attacks able to steal passwords for some wireless   networks and VPNs, or virtual private networks. It won't issue a security update for the pro read more ...
Security researchers have discovered a single piece of malware that is capable of spreading to four different platform environments, including Windows,MacOSX, VMware virtual machines, and Windows Mobile devices. First read more ...
Several vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information. A remote user c read more ...
The ability to spoof the reply-to information on Apple iOS SMS messages is a reminder that such messages should not be considered any more secure than email when it comes to authenticating senders, experts say. A sche read more ...
We've all heard about phishing attacks -- those spammy e-mails you get in your in-box imploring you to divulge your personal information. Now those annoying scams are coming to a cell phone near you -- it's called smishi read more ...
Microsoft on Tuesday fixed a critical vulnerability in a component of Office, SQL Server and other widely deployed applications that attackers already are using in targeted attacks. The flaw in the Microsoft Common Contr read more ...
When a few hundred Dropbox users began receiving spam emails about online casinos and gambling sites two weeks ago, it seemed like something was up. And indeed there was. The online file storage service confirmed toda read more ...
Cybercriminals have developed a custom piece of malware that injects itself into your Facebook session and prompts you to donate to a charity for sick children. The scammers' goal is to make off with your personal data, read more ...
Security researchers testing Google's Bouncer malware detection system forAndroidapps have managed to submit a benign app and then slowly update it to add malicious functionality, one of the researchers told CNET today. read more ...
The following is an article from CNET.  While the title is alarming, individuals practicing net safety are not impacted.  Drop me an email if you need more information on safe use of the Internet.  (Email Fred) Androi read more ...
There's a pretty good chance you've scanned a QR code with your smartphone. QR is short for "quick response." Hidden in those lines are embedded code only your smartphone can read that points it to a new location on the read more ...
Thousands of office printers from large businesses around the world are churning out page after page of gibberish and wasting vast reams of paper. For once it seems malware is to blame. Dubbed “Trojan.Milicenso,” i read more ...
Apple has made a small change to a Mac marketing webpage that is a big deal to people who care about computer security. We’re talking about the “Why you’ll love a Mac” webpage. For the past couple of years, Apple has read more ...
A zero-day flaw in versions of Microsoft's XML Core Services (MSXML) is being actively exploited in the wild. The vulnerability, which was discovered by Google, exists when MSXML attempts to access an object in memory read more ...
Apple’s Siri is unsuitable for business and enterprise networks, according to F-Secure vice-president Maria Nordgren. Why? Not only has Siri read your contacts, knows your calendar off by heart, and probably knows you read more ...
After it was discovered that more than six million LinkedIn passwords had been leaked as well as many at Last.fm and eHarmony, no one has stopped talking about password and passcode security. That’s actually a good th read more ...
After confirming that member passwords were comprised, eHarmony said today it is continuing to investigate the incident, but it appears no other information was taken. "While our investigation is ongoing, we have not read more ...
LinkedIn is investigating reports that millions of user passwords have been breached and posted on a Russian hacker forum. The post allegedly contains a file that lists roughly 6.45 million SHA-1 hashed but unsalted p read more ...
Wikipedia has issued a warning to its millions of visitors. The headline says it all: “If you’re seeing ads on Wikipedia, your computer is probably infected with malware.” The free encyclopaedia gives three examples o read more ...
Security researchers from Trusteer have intercepted a Tatanga malware variant capable of bypassing the SMS based transaction authentication protection of German banks. Here’s how it works: The scam targets online ban read more ...
It might be worth thinking about keeping your friends close, but keeping your Facebook friends carefully cordoned off from the eyes of your employers, if a recent report from IT research firm Gartner is any indication. T read more ...
malware campaign targeting Facebook, Google Mail, Hotmail and Yahoo user debit card data has been linked to the infamous Zeus Trojan. Zeus is one of the most prevalent pieces of financial malware on the Web. During th read more ...
Pay-per-click revenue in the online advertising business may be diminishing for traditional media publishers, but thieves increasingly are earning five- to seven-digit returns when victims click on a booby-trapped link o read more ...
Text messaging is the most common non-voice use of a mobile phone. There are trillions of text messages received around the   world each day, and an increasing number of them are spam, or phishing attacks of some sort. read more ...
An Apple programmer, apparently by accident, left a debug flag in the most recent version of the Mac OS X operating system. In specific configurations, applying OS X Lion update 10.7.3 turns on a system-wide debug log fi read more ...
In an attempt to take advantage of the popularity of free photo-sharing app Instagram among smartphone users, malware writers   have created fake Instagram websites to distribute Android Trojan horses, according to secur read more ...
Hewlett-Packard officials are saying that the number of vulnerabilities in commercial applications is continuing to fall, dropping almost 20 percent between 2010 and 2011. However, while the downward trend in vulnerab read more ...
Symantec is urging customers to disable PCAnywhere until it issues a software update to protect them against attacks that could result from the theft of the product's source code. Someone broke into Syma read more ...
Despite the well-known security risks associated with services like Facebook and Twitter, social networking usage in business is becoming even more active, according to a new report from Palo Alto Networks. The social read more ...
by Elinor Mills This was an exciting/anxious year in the Internet security community, with big tech firms like Sony and RSA getting hacked, putting consumer data and corporate networks at risk, and w read more ...
More than one quarter of data breaches so far this year involved consumer records that were jeopardized when organizations lost control over sensitive paper documents. Experts say those incidents came to light in large p read more ...
by Jamie Riden It was a bad start to a Monday morning: I arrived at work to find the intrusion detection system so bogged down in alerts that it was barely responsive. Something bad had happened over the weekend. T read more ...
Apple is expected to announce their next smartphone September 4. Scammers know this and they know people are excited about the upcoming announcement. So they are spamming out malicious e-mails with messages such as th read more ...
In 2005, the Federal Financial Institutions Examination Council stated: The agencies consider single-factor authentication, as the only control mechanism, to be inadequate for high-risk transactions involving access to read more ...
How often do you change your password? Do you share your passwords with family members, and how confident are you that malicious attackers would not be able to guess your password? According to a newly published surve read more ...