Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Aaaugh! 1 in 5 U.S. Windows PCs Lack Antivirus Defenses

Un-friggin-believable but true. Don't be one of them! Gregg Keizer at ComputerWorld was the first with this story. "Nearly a fifth of Windows PCs in the U.S. lack any active security ...

CyberheistNews Vol 2, #24

CyberheistNews Vol 2, #23

CyberheistNews Vol 2, #22

Norton Protects Against Flame?

[caption id="" align="alignleft" width="260" caption="Norton Protects Against Flame?"][/caption] The antivirus industry is making hay with the new Flame malware, but Symantec marketing is ...

Chinese hacker brings grief to Calgary’s Catholic school system

Hackers will find any mail server that is not protected and/or configured correctly and use it to send out as much spam as possible. This gets the unsuspecting organization blacklisted ...

New Cyberweapon 'Flame': CIA and Mossad Coproduction

'Flame', the most sophisticated piece of malware to date, was discovered by the International Telecommunication Union (ITU) and Kaspersky Lab. This code is more complex and has more ...

Banks warned of sophisticated new online scam

Antone Gonsalves at NetworkWorld got this story first. Here is how the scam works, so do not fall for it. You can recognize it by the grammar and spelling mistakes. "The cyber-criminals ...

Ten years of Windows malware

Ed Bott wrote a truly excellent article over at ZDNet where he describes the history of Windows Malware, which shows on the very first slide that most malware is installed via social ...

VIDEO The Top 5 Online Security Traps And How To Avoid Them

GFI is one of the few antivirus vendors that understands the importance of prevention and end-user training. They produced this useful video that in two minutes illustrates the top 5 ...

Gmail Security Hole Allows Hackers To Automate Social Engineering Trick

Christopher Mims over at Technology Review was the first one to report on this. A large Gmail security hole could lead to mass harvesting of accounts, as hackers can automate this social ...

Fake Facebook “Account Cancelation Requests” Lead to Malware

Softpedia reported: "A shady-looking email, apparently originating from Facebook, has been seen in inboxes, informing users that the social media network has received an account ...

Hackers Target the Weakest Link: The End User

I was interviewed by Jeremy Quittner yesterday. Here is how he started his article in American Banker today: "It took Stu Sjouwerman, the founder and chief executive of security firm ...

Guessable Passwords: The Unpatchable Exploit

Monday morning, I found a tweet by @INFOSECSchool with the above title. I admit, it's a catchy phrase and sure enough, IF you allow easy passwords, it's an invitation to get hacked. This ...

Fake Amex ID Verification

[caption id="" align="alignleft" width="260" caption="Fake Amex ID Verification"][/caption] OK, here is another one to warn everyone about, especially the employees that have a ...

Spot the security "no-no"

[caption id="" align="alignleft" width="260" caption="Spot the security "no-no""][/caption] Wow, talk about a TV interview that contains a massive vulnerability. We think this is a press ...

Russia's most effective cybercriminals

Rod Rasmussen over at SecurityWeek has a really interesting article about a Russian cyber gang driving a massive wave of fraud: "Tucked away in a small town outside Moscow, Russia one of ...

Spear-phishing attacks hit gas pipeline networks

A Homeland Security Department cyber response team focusing on industrial control systems has issued a warning to the natural gas pipeline industry of targeted cyberattacks that have ...

Gartner considers security awareness training an essential tool for all companies

Linda Musthaler, at NetworkWorld just wrote an excellent article about training workers to be cyber safe. One paragraph was especially noteworthy: “In 2012 we’re already seeing a sharp ...

I am a malware coder and botnet operator

This is a discussion on Reddit, where a (presumably Polish) malware coder and botnet operator very candidly answers questions from people. This is a fascinating but rather technical read, ...

CyberheistNews Vol 2, #21

News - FBI warns against malware installed via hotel networks

The Internet Crime Complaint Center had this 'Intelligence Note': "Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers ...

Interpol President: "80% of Internet Crime Is Organized International Gangs."

Fresh from Yahoo News by Steve Weizman: "Interpol president Khoo Boon Hui said on Tuesday that organised international gangs are behind most internet scams and that cyber crime's ...

The personal cloud will eclipse the PC

The personal cloud is poised to eclipse the PC as the hub of consumers' digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm for how people ...

The Average Cyberespionage Attack Goes On For 416 Days

WIRED Mag has a great article by Kim Zetter. It boils down to the fact that high-level hackers are able to get and stay in your network. And even if you are able to kick them out, they ...

The evolution of Business Cards

I just got a 'perk' over at the Klout site, which gives you a score how you do in Social Media. The perk was 50 business cards, each with a different backside if you want to. The company ...

Symantec Report Says User Behavior is Root of Most Breaches

Tracy Kitten over at BankInfoSecurity spotted something interesting in Symantec's recent Internet Security Threat Report. This is the upshot: "Which Internet security threats pose the ...

No Exploit Required: How Attackers Exploit Business Logic Flaws

Kelly Jackson Higgins over at Dark Reading had a very interesting article: "Cyberattacks don't always employ exploited vulnerabilities: Sometimes they prey on weaknesses in the business ...

$1,000 Walmart Gift Card Scam Inflates Your Phone Bill

We have seen crooked Walmart gift card offers before, but now and then I run across one that's craftier than earlier versions. And as usual, you do not get the gift card, but a high dose ...

How To Land A Cybersecurity Job

Just found an article in NetworkWorld by Carolyn Duffy Marsan that is very interesting. Here is a snippet: "One specific skill related to cloud security that's in demand: SAML. The ...

Proof: Antivirus Only Defends Against Low-skilled Attackers

The SANS Computer Forensics and Incident Response team built a real-life network for their students so they could learn how to hack into the network. They put McAfee enterprise endpoint ...

Scam Of The Week: Fake Storage Upgrades

Phishers are now offering fake storage upgrades. Symanted reported: "Customers of popular email service providers have been a common target for phishers for identity theft purposes. ...

CISPA fight far from over. A Guide To The Cybersecurity Bill Alphabet Soup

Stefanie Hoffman over at Fortinet took the time to summarize the current cybersecurity bills. This fight is far from over, so you might want to take a look at what's cooking at Capitol ...

CyberheistNews vol 2, #20

CyberheistNews Vol 2, #20 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Warn Your Users: NY Traffic Ticket Phish This phish is a ...

Bogus PayPal payment alert causes malware infection

Gary Warner just reported: "A new malicious spam campaign has just launched this morning targeting Paypal users. This malware campaign attempts to "social engineer" users into clicking a ...

Cybercrime uses hidden file extensions to trick users

Symantec contributor Fred Gutierrez shows clearly in this blog post why it can be deadly to click on a .JPG file: "Cybercriminals have continuously evolved their methods throughout the ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.