Remove Book Remove Security Awareness Remove Social Engineering
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. The employees at your organization are badly in need of security awareness training. What do you do? Bore them with dull content that feels like a lecture.

article thumbnail

5 Emotions Used in Social Engineering Attacks [with Examples]

SecureWorld News

Famed hacker Kevin Mitnick learned early on to use emotion to manipulate and socially engineer his targets. At the time, his targets were typically sysadmins, and the social engineering started with a phone call. Security awareness advocate says 'check your emotions'. Hacker targets victims with fear.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Battle for Attention: How Cybersecurity Fights for Truth in a World of Noise

Jane Frankland

” This observation, from Chris Hayes’ book T he Sirens’ Call: How Attention Became the World’s Most Endangered Resource cuts to the heart of a growing challenge in every domain of modern society. Drop me a message on LinkedIn or book a call.

article thumbnail

Cybersecurity in Aviation: Rising Threats and Modernization Efforts

SecureWorld News

Additionally, a distributed workforce, ranging from remote maintenance technicians to cabin crews, multiplies entry points for social-engineering tactics like phishing. Aircraft themselves are nodes on data networks, constantly transmitting telemetry, engine performance metrics, and passenger connectivity data.

article thumbnail

September Snafus: Hackers Take Advantage of Unwitting Employees

Approachable Cyber Threats

Category News, Social Engineering. All of the attacks were carried out with relatively simple phishing and social engineering techniques. IHG’s booking sites and apps were unavailable for several days as a result. Risk Level. Several large companies were hacked in the first half of September. The common theme?

article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

In our most recent Remote Sessions webcast, Roger Grimes, computer security expert and Data-Driven Defense Evangelist for KnowBe4, gave a deep dive on phishing and how to properly mitigate and prevent phishing attacks. Grimes has worked in the cybersecurity industry for more than 30 years, authoring 13 books and more than 1,300 articles.

article thumbnail

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

Security Boulevard

A new book exposes yet another Facebook failure for the social media firm to say sorry about. The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard. But nothing’s going to change.

Media 143