Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Researcher Warns 'Zombie Browsers' Are Skyrocketing

Ellen Messmer at Network World covered this one: "Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's ...
Continue Reading

2013 Security Awareness Training Survey

I just recevied some interesting information. SearchSecurity.com surveyed IT professionals about their end-user security training purchase intentions for 2013. The numbers are revealing. ...
Continue Reading

7 shortcuts To Get Your Network Hacked

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...
Continue Reading

Why We Are Doing This

Some of you might remember Sunbelt Software, which from 1996 to 2010 sold system admin and security tools for Windows Server. I am one of the two co-founders of Sunbelt. After ...
Continue Reading

Cybergeddon - New Web Series Sponsored By Symantec

[caption id="Cybergeddon" align="aligncenter" width="570"]Missy Peregrym in the Yahoo Web series Cybergeddon Still from Cyberteddon © Yahoo. All rights reserved.[/caption] Not sure how I ...
Continue Reading

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...
Continue Reading

What Is The Top Phishing Day Of The Week? And Why?

[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...
Continue Reading

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
Continue Reading

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...
Continue Reading

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...
Continue Reading

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/
Continue Reading

CyberheistNews vol2, #45

Continue Reading

Cyberespionage miniFlame malware discovered

Antone Gonsalves at CSOonline covered this in-depth on October 16, 2012. "Newly discovered spying malware designed to steal data from infected systems was likely built from the same ...
Continue Reading

FBI has new Cyber Safety Website

10/15/12 - the FBI announced a new initiative: "With school back in session, one topic that’s on many class curriculums around the nation is cyber safety. After all, it’s a ...
Continue Reading

CyberheistNews vol2, #44

Continue Reading

CyberheistNews vol2, #43

Continue Reading

CyberheistNews vol2, #42

Continue Reading

CyberheistNews vol2, #41

Continue Reading

CyberheistNews vol2, #40

Continue Reading

CyberheistNews vol2, #39

Continue Reading

CyberheistNew vol2, #38

Continue Reading

CyberheistNew vol2, #37

Continue Reading

CyberheistNews vol2, $36

Continue Reading

CyberheistNews vol2, #35

Continue Reading

Prepaid Cards Go Mainstream - Watch For New Scams

[caption id="" align="alignleft" width="270" caption="Bluebird prepaid card"][/caption] Wal-mart and American Express have started a joint venture to sell prepaid Bluebird cards, stamped ...
Continue Reading

Hackers exploit Skype API to infect Windows PCs

Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...
Continue Reading

Defending Against Phishing Attacks

By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews