Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Global Payment Hack: Almost 340 Million Drop in Value

[caption id="" align="alignleft" width="290" caption="Global Payment Hacked"][/caption] This is what they said in their press release: “Global Payments Inc. (NYSE: GPN), a leader in ...
Continue Reading

New Strategies to Fight Phishing

[caption id="" align="alignleft" width="175" caption="Fighting Phishing"][/caption] BankInfo Security summarized the phishing problem for the Financial Industry, and quotes the security ...
Continue Reading

Users are the weakest link in IT

Some excellent work by our colleagues at Trend Micro. They see that users are the weakest link in IT! [caption id="" align="alignleft" width="550" caption="Weakest Link in IT"][/caption]
Continue Reading

Malicious Office documents target Mac OS X

Trendmicro reported: "We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the ...
Continue Reading

Unique Malware Samples 2006-2011

[caption id="" align="alignleft" width="361" caption="Malware Unique Samples"][/caption] Malware is still exploding. Check out this graph. During the last few years, the security industry ...
Continue Reading

Video on Zeus Botnet Takedown

You have probably heard about how Microsoft, the US Marshals together with some other organizations killed some some Zeus botnets. Microsoft's PR crew released a video about the operation ...
Continue Reading

Netherlands Gets European Centre for Cybercrime

Holland's capital The Hague will get a new international showpiece. The new European Centre for Cybercrime will start there early 2013. European Commissioner for Home Affairs Cecilia ...
Continue Reading

CyberheistNews vol 2, #14

Continue Reading

How To Phish Your Employees

I wrote a new article that is also available in the resources section on our website: More and more, the bad guys are bypassing your firewall, endpoint protection and other ...
Continue Reading

Shield your business from cybercrooks

Anne Fisher, Editor of New York's Executive Inbox wrote: "Can you recognize a potentially disastrous breach of your computer system’s security when you see it? Let’s find out with two ...
Continue Reading

Look Ma, malware without files!

Wow, instead of an exploit dropping a file onto the file system and running it... a DLL is injected straight into memory from the exploit, leaving nothing to scan on the harddrive. Writen ...
Continue Reading

CyberheistNews vol 2, #13

Continue Reading

CyberheistNews vol 2, #12

Continue Reading

CyberheistNews vol 2, #11

Continue Reading

CyberheistNews vol 2, #10

Continue Reading

CyberheistNews vol 2, #9

CyberheistPoll Survey Results:
Continue Reading

CyberheistNews vol 2, #8

Continue Reading

CyberheistNews vol 2, #7

CyberheistNews Vol 2, #7 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Facebook Malware Scam Of The Week A "worrying number" of ...
Continue Reading

For cloud services, security first - growth second

Richard Stiennon at Forbes has a very good point. "My oft repeated advice for technology vendors is that security sells. Given a choice between two vendors of similar products or services ...
Continue Reading

The Cridex malware trojan hides in fake LinkedIn invitations.

The Cridex malware trojan hides in fake LinkedIn invitations. Take care with those invites! GFI Labs recently discovered a LinkedIn email phishing scam that installs a banking trojan. It ...
Continue Reading

Major malware gang taken down today in Russia

Members of the largest criminal group engaged in online banking fraud are detained March 20, 2012 MOSCOW — Group-IB, the first Russian company providing comprehensive investigation of IT ...
Continue Reading

CyberheistNews vol 2, #6

CyberheistNews Vol 2, #6 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Facebook Malware Scam Of The Week A "worrying number" of ...
Continue Reading

CyberheistNews vol 2, #5

Continue Reading

CyberheistNews vol 2, #4

Continue Reading

Its Tax Scam Season

Warn everyone that 'Tax Scam Season' is upon us, and that no one should respond to anything tax-related via email. The IRS does not use email or social media, don't fall for refund offers ...
Continue Reading

CyberheistNews vol 2, #3

Continue Reading

CyberheistNews vol 2, #2

Continue Reading

CyberheistNews Vol 2, #1

Continue Reading

The Top 5 Executive Spear-phishing Scams

We recommend you copy and paste this section, and send it to your executive team, with a warning that they might be targeted with spear-phishing attacks. They need to 'Stop, Look, Think' ...
Continue Reading

Fake AV Attack Targets Wordpress Users

Websense detected a new wave of mass-injections of a well-known rogue AV campaign. It targets websites that use the open source WordPress website content management system. Websense ...
Continue Reading

Cost of penetration testing < cost of security incident :)

The Cost of a Security Incident Is Usually Much Greater Than Preventing It This is a blog post by John Pescatore, July 24, 2009, and still as valid today as it was then. "A few years ago ...
Continue Reading

RSA Post-mortem: Massive Human Component To Security

George Hulme wrote on the CSO site: "There was an unusual level of gloom at the RSA Conference this year, and for good reason: a number of the biggest and most respected security firms ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews