Remove InfoSec Remove Phishing Remove Scams Remove Security Awareness
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. The employees at your organization are badly in need of security awareness training. What do you do? Bore them with dull content that feels like a lecture.

article thumbnail

Phishing Awareness Training: Best Providers 2020

Spinone

Phishing attacks are one of the main cyber threats involving mistakes by workers. Arranging training for your employees is a great way to protect your company against phishing and its expensive and time-consuming consequences. So, let’s take a look at notable phishing awareness training providers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Email Compromise Scams

Security Boulevard

This month we discuss Business Email Compromise (BEC) scams. What are they, how to identify them, and why BEC scams have created over $1.8 The post Business Email Compromise Scams appeared first on The Shared Security Show. The post Business Email Compromise Scams appeared first on The Shared Security Show.

Scams 59
article thumbnail

NIST hints at upgrades to its system for scoring a phish’s deceptiveness

SC Magazine

A graph representing the NIST Phish Scale scoring methodology. Introduced in September 2020, the NIST Phish Scale scores phishing emails based on certain key properties to determine their level of sophistication and deceptiveness. their organization faces.”.

Phishing 114
article thumbnail

Cyber CEO – Cyber Hygiene is More Critical for Your Business Now Than Ever Before – Here’s Why

Herjavec Group

Hackers are routinely attempting novel ways to infiltrate corporate networks so it’s important to ensure that your employees are aware of how their online behavior can make them – and you – more vulnerable. Build security awareness training modules to educate your employees on how to spot phishing emails or business-related scams.

article thumbnail

Story of the year: the impact of AI on cybersecurity

SecureList

For example, in our research , we encountered persistent hallucinations from an LLM when tasked with flagging suspicious phishing links. There are various malicious scenarios where LLMs could potentially be of service, such as creating phishing emails and malware as well as giving basic penetration testing advice.

article thumbnail

Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware

Security Boulevard

The post Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware appeared first on The Shared Security Show. Scott and Tom explain why privacy isn’t dead, why should everyone should care about their privacy, and how you should respond to someone that says “I don’t care about privacy, I have nothing to hide!”.

Malware 98