Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.


Wombat Vlog: Avoiding Tax-Related Phishing Scams

Posted by Gretel Egan on Feb 23, 2017 1:45:15 PM

Check out and share our latest vlog post and infographic, in which we offer advice about how to avoid becoming a victim of tax fraud.

Read More »

Wombat Vlog: What Is Social Engineering?

Posted by Gretel Egan on Jun 15, 2016 4:00:00 PM

In this first segment of our two-part video blog, I bring end users up to speed on the concept of social engineering. Viewers will understand what this threat is and the ways they might encounter social engineers in their work and personal lives, including phishing attacks, smishing text messages, social media fraud, vishing calls, and imposter scenarios. I also discuss the emotional aspect of social engineering, and how attackers attempt to use our natural human tendencies to trick us into providing access to people, places, and things that should be off limits. 

Read More »

Holiday Shopping Tips for Black Friday, Cyber Monday, and Beyond

Posted by Gretel Egan on Nov 24, 2014 10:24:00 AM

Last updated: October 30, 2017

It’s the most wonderful time of the year for online retailers — and online scammers. The deals dance like sugarplums in your email inbox and your incoming text messages. And while you’re likely to find a few of your favorite things in the advertising onslaught, there are plenty of lumps of coal mixed in. And these duds will leave you with more than a sooty stocking.

How to sort the naughty from the nice? Here are a few holiday shopping tips that will help you stay safe as you navigate the online deals and emails through Black Friday, Cyber Monday, and beyond.

Read More »

Mobile Phone Security Part II: Different Ways to Attack

Posted by Mike Bailey on Jul 31, 2014 7:53:00 AM

By: Michael Bailey

Beyond the dangers in smartphone applications and settings, as I mentioned in another post, there are dangers inherent in three of the most commonly used items on modern phones: Phone calls, text messages and email. Mobile phone security, while certainly not unique, creates a more difficult environment for protecting end users. Read More »

Here’s your chance to be proactive instead of reactive

Posted by Abaker on Aug 1, 2013 7:06:49 AM

It must be tiring to constantly react to attacks instead of being ahead and ready for what’s to come. Well security officers you have a chance to get ahead on this one.

"You've got smishing attacks that are as prominent as phishing attacks are," Pugh says.

Read More »