HackDig : Dig high-quality web security articles for hacker

Phishing Simulations: Should they Reflect Real-World Attacks?

<p><img src="https://info.phishlabs.com/hs-fs/hubfs/Real%20World%20or%20Nah_.png?width=300&amp;name=Real%20World%20or%20Nah_.png" alt="Real World or Nah_" width="300" style="width: 300px; float: right; margin: 0px 0px 10px 10px;">As the manager of a security awareness team, whose primary goal is to educate users on how to spot phishing attack
Publish At:2019-09-19 22:40 | Read:491 | Comments:0 | Tags:Phishing Simulation security awareness training

What Makes a Good Simulated Phish?

<p><a href="http://info.phishlabs.com/hubfs/blog-files/Bad_template.png"><img alt="Bad_template.png" src="http://info.phishlabs.com/hubfs/blog-files/Bad_template.png" style="width: 425px; margin: 0px 0px 10px 10px; float: right;" title="Bad_template.png" width="425"></a></p> <p>If your security awareness training provide
Publish At:2016-03-31 19:00 | Read:2211 | Comments:0 | Tags:T2 Phishing Simulation Employee Defense Training EDT

Building a Business Case for Effective Security Awareness Training

<p><img alt="stamp-of-approval.png" src="http://info.phishlabs.com/hubfs/blog-files/stamp-of-approval.png" style="width: 226px; float: right;" title="stamp-of-approval.png" width="226"></p> <p>Security education programs are sometimes mandated, always important, and often difficult to justify the investment. It is easy to get the po
Publish At:2016-03-18 22:10 | Read:2976 | Comments:0 | Tags:Awareness Training T2 Phishing Simulation Employee Defense T

The first spear phishing protection solution driven by real-world intelligence

<p>Today we announced a new solution that I believe will transform how organizations counter spear phishing attacks. We call it <a href="https://www.phishlabs.com/t2-spear-phishing-protection/">T2 Spear Phishing Protection</a>, and it takes advantage of our deep insight into phishing attacks to prepare organizations for the real-world attac
Publish At:2016-02-02 16:30 | Read:3302 | Comments:0 | Tags:Spear Phishing Awareness Training T2 Phishing Simulation

The Cyber Security Iceberg – Which Way Is Up?

Spear-phishing seems to be everywhere these days. According to Symantec’s recently published 2014 Annual Report, five out of every six large companies (2,500+ employees) were targeted with spear-phishing attacks in 2014, a staggering 40 percent increase over the previous year. The Cyber-Security Iceberg When discussing the importance of strengthening user aw
Publish At:2015-06-08 18:05 | Read:4214 | Comments:0 | Tags:Cyber Security Assesment Phishing Uncategorized Cyber Securi

The 4 Phishing Commandments – #4 Unshare Thyself

We started this series with an introduction to how criminals have adapted their cyberattacks around the abundance of personal information available online, and continued with two posts highlighting key phishing identifiers: Email Addresses and Links. This post opens with a few more phishing related tips and wraps the series up with concrete steps you can tak
Publish At:2015-05-11 15:25 | Read:5067 | Comments:0 | Tags:Cyber Security Assesment Phishing attachments awareness Frie

The 4 Phishing Commandments – #3 Know Thy Link

So we know cybercriminals are targeting us on account of the abundance of personal information available on the internet (Post #1), and we can smell a bogus email address or domain name a mile away (Post #2), but what guidelines help us identify a rogue link when we see one? And what are common link–clicking pitfalls to avoid? Before diving into links, let’s
Publish At:2015-05-04 17:40 | Read:3653 | Comments:0 | Tags:Phishing Uncategorized "Chat Phishing" "Spear Phishing" "wat

2014 Cyber Security Highlights

“There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.” James Comey, FBI Director, October, 2014 Introduction Cybercrime in 2014 exceeded even the most pessimistic expectations and far surpassed in magnitude and severity anything seen in recent years. Looking back at the y
Publish At:2014-12-29 02:05 | Read:4014 | Comments:0 | Tags:General Updates Attack simulation client side attack Cyber S

“Phish & Tips” anyone?

10 tips on how to identify phishing emails Phishing is a form of Social Engineering that is used to manipulate users into surrendering sensitive data, credit card details and confidential data. Cyber criminals use Social Media and emails that are almost identical to emails coming from legitimate companies and often require filling out personal details, downl
Publish At:2014-10-25 18:10 | Read:3986 | Comments:0 | Tags:Cyber Security Assesment anti-phishing Attack simulation cli


Share high-quality web security related articles with you:)


Tag Cloud