Remove Cybercrime Remove Social Engineering Remove Webinar
article thumbnail

To empower, not intimidate: a new model for cybersecurity awareness

BH Consulting

That was the message from a recent webinar that BH Consulting founder and CEO Brian Honan delivered for Géant, which provides networks and services to the research and education sector in Europe. Cybercrime can have real-world impact on individuals,” Brian said. “We We need to refocus our thoughts on the people.

article thumbnail

AI Dilemma: Emerging Tech as Cyber Risk Escalates

Trend Micro

6 Alerts Back Unread All Inside the criminal mind: Trend’s deep dive into cybercrime. Under Attack? close Read report > Cloud security that leads: Centralized, multi-layered protection now named a CNAPP Leader by IDC. close Read report > Cloud security that leads: Centralized, multi-layered protection now named a CNAPP Leader by IDC.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Top Ways: Building an Effective Cybersecurity Awareness Campaign

SecureWorld News

Our guests included: Cindy Liebes, Chief Program Officer for the Cybercrime Support Network; Jake Wilson, Security Awareness Evangelist for Western Governors University; and Gretel Egan, Senior Security Awareness and Training Strategist for Proofpoint. Bonus: It may also be eligible for CPE credits for your certification.

article thumbnail

Town Negotiates Financial Recovery Plan After Cyberattack Drains Funds

SecureWorld News

Still, little was reported about the details of the cyber incident, including who the attackers are, how the cyberattack happened, and the social engineering methods used to make the email look official. This type of cybercrime continues to fleece organizations even though it lacks the sexy headlines of a ransomware attack.

article thumbnail

BEC scammers impersonate CEOs on virtual meeting platforms

Security Affairs

Scammers use to compromise legitimate business or personal email accounts through different means, such as social engineering or computer intrusion to conduct unauthorized transfers of funds. Crooks started using virtual meeting platforms due to the popularity they have reached during the pandemic. ” reads the FBI’s PSA.

article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

The malicious campaigns Charming Kitten are unleashing on unsuspecting victims makes use of superior social engineering, such as creating dummy accounts on Gmail that look realistic enough to trick users into clicking through. Users were instructed to activate an invitation to a (fake) webinar by logging in.

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

As we mentioned in a previous blog , hackers come in many forms, but their methods can generally be classified into three distinct types of cybercriminals: The Impersonator – Hackers that pretend to be others, often using social engineering and human psychology to trick users.

Scams 119