article thumbnail

Personal Cybersecurity Concerns for 2023

Security Through Education

Impersonation Scams. These range from simple to sophisticated scams to convince you they are genuine, in hopes that you feel comfortable sharing personal or financial information whether on the phone, via email, or text. Although BEC attacks may be targeted at business, they can also be used to scam individual people.

article thumbnail

Cyber CEO – Cyber Hygiene is More Critical for Your Business Now Than Ever Before – Here’s Why

Herjavec Group

Build security awareness training modules to educate your employees on how to spot phishing emails or business-related scams. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OSINT in 60 seconds. Mind reading on TV

Pen Test Partners

This post is about how we did it Finally, not shown in the piece, we spent time helping the targets understand how we found the data and showing them how to secure their online presence Bank scams and how to avoid them, with Alexis Conran We were asked to help make a TV show about the information that people share online being abused by scammers.

Scams 72
article thumbnail

Your New Stimulus Check Might Not Be Safe From Cybercriminals

Identity IQ

The fraudulent email messages using the COVID-19 American Rescue Plan as bait target the infosec and technology sectors while employing subject lines ranging from “Joe Biden Rescue Plan Act” to “IRS Rescue Plan Form” to “President’s Rescue Plan Act.”

article thumbnail

Security Roundup October 2021

BH Consulting

A pledge to prevent harassment of infosec professionals. MORE Educational videos that teach how to hack? MORE Who scams the scammers? We also cover this attack vector in our comprehensive white paper on ransomware. Why soft skills are just as important as technical expertise in security roles. You won’t find them on TikTok.

VPN 52
article thumbnail

NIST hints at upgrades to its system for scoring a phish’s deceptiveness

SC Magazine

Understanding the detection difficulty helps phishing awareness training implementers in two primary ways,” said Jody Jacobs, infosec specialist at NIST, in a session held last Tuesday at the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)’s 51’s General Meeting.

Phishing 114
article thumbnail

Story of the year: the impact of AI on cybersecurity

SecureList

Besides controversy surrounding the potential use of deepfakes and image generation tech, such as Stable Diffusion, in disinformation campaigns and non-consensual pornography , they, for example, were used in various scams , such as the famous cryptoscam featuring the fake video of Elon Musk. Since the debut of GPT-3.5