Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.
Businesses and consumers around the world are encouraged to adopt two-factor authentication as a means of strengthening login security. But 2FA isn't ironclad: attackers are finding ways to circumvent the common best practice. In this case, they use social engineering.
EVENT REVIEW: Notorious hacker Kevin Mitnick wows guests at Palm Beach event
More than one person left The Breakers feeling vulnerable April 4 after notorious hacker Kevin Mitnick showed how easy it is for hackers to access personal information with just a few keyboard clicks.
KnowBe4’s Year-Over- Year Sales Rocket 191% for Q1 2018
Continued surge of phishing and other social engineering threats fuel explosive 20th consecutive quarter increase.
KnowBe4, the world’s largest platform for integrated security awareness training and phishing announced its stellar year over year sales increase of 191% for Q1 2018, with an ever-increasing number of new corporate accounts, bringing customer accounts to well over 17,000.
While smartphones are the epitome of modern convenience, these devices which store our personal and professional information like emails, photos, bank details etc. can easily fall prey to hackers and to other malicious activities. With the recent series of data breaches across businesses globally, the concern regarding protecting user data has become more relevant than before. There are many applications in your smartphones that access your private data by taking permissions through pop-ups or otherwise. You would notice apps like third-party applications, flashlights, etc. asking permissions to access your gallery, messages, calls, which they don’t need. Allowing these third-party applications access to your smartphone's data puts your information at risk. Hardip Singh, Executive Director, Optiemus Infracom, feels that the dirty little secret that these ubiquitous devices, which we have with us 24X7, and keep switched on for most of the time, is also a serious threat to our privacy. An innocent looking message could be all that is needed to compromise on your privacy — accessing your microphone, your call logs, your locations, your bank details and everything that is very personal to you. Here’s why:
WATCH: Transforming Security Culture With KnowBe4 Training And Phishing
Video
Transforming Security Culture With KnowBe4 Training And Phishing
After a zero-day ransomware attack hit an HVAC company a few years ago, they had to shut down for 1.5 days. They estimated it would take $2 million in new contracts to recoup damages.
Trust nothing, question everything: Social engineering and the insider threat
Social engineering (in the context of information security): The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
EVENT REVIEW: The Spiciest Bites from SpiceWorld 2017
The CBT Nuggets crew traveled to Austin, Texas, for SpiceWorld 2017 — and we met hundreds of IT pros, partied with the spiciest crowd in IT, and heard stories about new tech and the people working in the industry. Here are the spiciest bites we were able to bring back from SpiceWorld. Think you can handle it?