THE MILITARY WALLET
October 22nd, 2021
Spear-phishers may use LinkedIn profiles to target military members, veterans and contractors with security clearances. Here's what you need to know to protect yourself.
October 15th, 2021
Always perform your search comparing the name of the person, name of their company, and their profession as recruiters on Google. If they are legitimate, you will find information that confirms their background.
September 29th, 2021
Savvy attackers work behind a computer screen; with the amount of information that an organization places online about itself and its staff, threat actors can use that data to gain access into an organization by cultivating inside help.
September 24th, 2021
September 9th, 2021
While cybercriminals are constantly looking for new ways to compromise IT systems, sometimes the old ways work just fine. Two cybersecurity vendors recently noted malware getting spread through a tried-and-true method: Microsoft Word documents.
June 1st, 2021
With increasing reliance on digital and remote work, common applications, and a diversified employee base, today’s businesses face an age-old and ever-evolving threat; the threat posed by human vulnerability.
SECURITY INFO WATCH
THE SWAT CLUB
August 20th, 2020
Peter Warmka identifies several key skills and competencies possessed by professional spies which are sorely lacking among today’s corporate managers.
Peter Warmka exposes social engineering methodology and the most effective defenses. Just as the Trojans of ancient literature were intrigued by a giant wooden horse, social engineers are assailing countless organizations today under seemingly innocent guises.
WORLDWIDE INTELLIGENCE NETWORK
February 27th, 2019
Sophisticated threat actors will frequently target the most significant vulnerability found in most organizations: the human factor. The interaction between human beings and the technology meant to protect the organization is commonly referred to as the weakest link in security.
October 20th, 2018
Chief financial officer Malcolm Fisher never thought he would be victimized by cybercrime—until a social engineer successfully impersonated him and bilked his company out of more than $125,000.
Subscribe to the Counterintelligence Institute Newsletter
FRAUD CONFERENCE NEWS
June 18th, 2018
It should come as no surprise that with the growing prevalence of the internet, it’s even easier today to get personal information on a potential target. Personal information is everywhere and criminals know exactly where to look.