blog-logo.png

A BLOG ABOUT CYBER SECURITY

Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.

Smishing

Wombat Vlog: What Is Social Engineering?

Posted by Gretel Egan on Jun 15, 2016 4:00:00 PM

In this first segment of our two-part video blog, I bring end users up to speed on the concept of social engineering. Viewers will understand what this threat is and the ways they might encounter social engineers in their work and personal lives, including phishing attacks, smishing text messages, social media fraud, vishing calls, and imposter scenarios. I also discuss the emotional aspect of social engineering, and how attackers attempt to use our natural human tendencies to trick us into providing access to people, places, and things that should be off limits. 

Read More »

Shop Safe in Cyberspace

Posted by Gretel Egan on Nov 24, 2014 10:24:00 AM

Last updated: September 26, 2016

It’s the most wonderful time of the year for online retailers — and online scammers. The deals dance like sugarplums in your email inbox and your incoming text messages. And while you’re likely to find a few of your favorite things in the advertising onslaught, there are plenty of lumps of coal mixed in. And these duds will leave you with more than a sooty stocking.

How to sort the naughty from the nice? Here are a few tips that will help you stay safe as you navigate the holiday shopping deals through Black Friday and beyond.

Read More »

Mobile Phone Security Part II: Different Ways to Attack

Posted by Mike Bailey on Jul 31, 2014 7:53:00 AM

By: Michael Bailey

Beyond the dangers in smartphone applications and settings, as I mentioned in another post, there are dangers inherent in three of the most commonly used items on modern phones: Phone calls, text messages and email. Mobile phone security, while certainly not unique, creates a more difficult environment for protecting end users. Read More »

Here’s your chance to be proactive instead of reactive

Posted by Abaker on Aug 1, 2013 7:06:49 AM

It must be tiring to constantly react to attacks instead of being ahead and ready for what’s to come. Well security officers you have a chance to get ahead on this one.

"You've got smishing attacks that are as prominent as phishing attacks are," Pugh says.

Read More »

Seven Simple Things You Can Do to Use Smartphones Safely

Posted by Jason Hong on Feb 22, 2013 9:46:24 AM

A study from Nielsen shows that 67% of new mobile phone purchases are smartphones. Smartphones have been proving valuable for enterprises and for personal use, in particular because of the app markets that make it easy for anyone to innovate new ideas. However, the same features that make smartphones useful also make them attractive to thieves and criminals.

Read More »