10 Security Reasons to Quit Facebook (And One Reason to Stay On)
You can't go a day without logging in to see what your friends are up to? Consider these reasons and you may decide to quit Facebook and reduce your risk.
View ArticleSecurity Consultants and Lawyers: Don't Trust Them to Manage Risks
Security consultant Scott Wright breaks down the similarities between attorneys and consultants -- and explains why neither can really give you the risk management you need
View Article4 things Facebook doesn't tell you about your privacy and security
Experts say read between the lines of the Facebook experience and you may still discover some unsettling factors
View Article4 reasons why executives are the easiest social engineering targets
Social engineers know your company's executive team has access to the most important information about the firm, and they also know they are some of the least secure employees
View Article6 Facebook, Twitter mistakes that can get you fired
Whether you are using social networks on company time, or at home in private, there are certain flubs that can spell trouble for your company's image, privacy and security. Here are 6 missteps to avoid...
View Article'Stop.Think.Connect.' campaign launched to curtail risky online behavior
Slogan is the result of a call from the White House to create an online safety campaign as memorable as 'Click It or Ticket.'
View ArticleCyber Monday: 3 online shopping scams and why people fall for them
Ready to take advantage of those great sales you're hearing about online? Check out these common schemes before you click
View Article7 Scrooge-worthy scams for the holidays
All crooks want for Christmas is to steal your money and sensitive information. Security experts give tips on how to avoid a holiday-themed highjinx.
View ArticleSocial networking security: 4 reasons why Facebook and vanity don't mix
A look at why self-glorification on social networks may make you the target of criminal adoration
View Article5 tips to avoid getting phished
As criminal spear phishing becomes more targeted, users need to be even more aware to avoid being duped
View Article5 more dirty tricks: Social engineers' latest pick-up lines
From a new twist on tech support to playing the odds with a large number of desperate job seekers, today's social engineers are getting very specific in their plans to manipulate their marks
View ArticleSocial engineering: My career as a professional bank robber
Today's criminals aren't stealing money -- that's so yesterday, according to Jim Stickley. He's broken into financial institutions large and small, but it's sensitive data he's after to demonstrate how...
View ArticleHow to rob a bank: A social engineering walkthrough
Professional social engineer Jim Stickley walks through the steps he typically takes to fool clients into thinking he's there for fire safety, while he's really proving they are an easy target for a...
View Article3 terrifying, but true, security tales
Just in time for Halloween, security expert Dr. Eric Cole shares three scary stories about cyber security starring the most terrifying monsters of all; humans!
View ArticleUsing security metrics to measure human awareness
Free tools offer security practitioners a way to measure the effectiveness of awareness programs
View Article5 myths about awareness
Lance Spitzner of SANS Securing the Human program outlines five common misconceptions about security awareness programs
View Article7 reasons for security awareness failure
Most security awareness programs are rife with problems, but it doesn't have to be that way. Eliminate these seven mistakes and be on your way to an effective program in your organization
View ArticleHow keylogging malware steals your information (includes video)
George Waller from StrikeForce Technologies demonstrates how this malicious software sneaks onto your computer and then steals your sensitive data
View ArticleSocial engineering: Study finds Americans willingly open malicious emails
A recent study shows that 30 percent of Americans will open emails, even when they know the message is malicious. These types of stats are an attacker's dream, but are they realistic?
View Article
More Pages to Explore .....