Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

CyberheistNews Vol 4, # 43 CryptoWall Ransomware Claims Fresh Victims

CyberheistNews Vol 4, # 43
Continue Reading

Koler Android Ransomware Now Spreads in U.S. as Text Worm

Android phones have by far the largest market share, and thus are mobile malware target #1. There is now a new variant of the Koler malware that spreads itself via text messages and holds ...
Continue Reading

Ad-borne Cryptowall Ransomware Claims Fresh Victims

The phones have been ringing off the hook here at KnowBe4. Not customers of ours but people that were hit with CryptoWall V2.0, needed bitcoin urgently, did a websearch and wound up with ...
Continue Reading

What's -Really- The #1 Hot Security Topic?

There is an enormous amount of noise in the security space, so how do you know what people really talk about and think is the most important topic? Well, we created the Hackbusters site ...
Continue Reading

Survey Finds Half of Holiday Shoppers Will Avoid Hacked Stores

Huffington Post Survey: "As another holiday shopping frenzy nears, a new survey suggests that many consumers plan to avoid the growing number of retailers that have been hacked.
Continue Reading

CyberheistNews Vol 4, # 42 Ransomware Hits Admin Workstation and Kills 7 Servers

CyberheistNews Vol 4, # 42
Continue Reading

Scam Of The Week: Ebola Phishing Grows In Volume

I have been warning here before that Ebola phishing attacks would be more and more prevalent, as a result of the mass-media spending increasing amounts of time covering this threat.
Continue Reading

Russian Cybercrime Rakes In $2.5 Billion These Last 12 Months

There is a Russian outfit called Group-IB. They released a report October 15th which goes into great detail on how Russian cybercrime makes its money. The picture is not pretty but very ...
Continue Reading

Ransomware hits admin workstation and kills 7 servers

I wanted to share a horror story with you, something that happened to somebody the day before yesterday. This is what happened in their own words:
Continue Reading

The Snappening - Snapchat naked selfies have leaked - but how?

Snapchat is supposed to not keep pictures and basically delete ("self-destruct") any pictures automatically. The ghostly cloud service itself was not hacked, but many megabytes of saved ...
Continue Reading

I was just interviewed on TV about the JP Morgan Hack

Tampa TV station 10News WTSP interviewed me about the JP Morgan Hack. You can see the short clip here:
Continue Reading

CyberheistNews Vol 4, 41 Scam of the Week: "Whatsapp Gold" & Security News Roundup

CyberheistNews Vol 4, # 41
Continue Reading

Why All This Russian Cybercrime in Five Minutes

We all know that a large amount of cybercrime originates in Russia and other eastern European countries that were former USSR states. But why is that? I decided to dig into this and did ...
Continue Reading

CyberheistNews Vol 4, # 40 Most Dangerous Cyber Celebrity of 2014?

CyberheistNews Vol 4, # 40
Continue Reading

CryptoWall 2.0 Ransomware Moves to TOR network

A new version of the world's most widespread ransomware CryptoWall has migrated to the TOR network. It has been upgraded to version 2.0, and continues to encrypt files so that ransom can ...
Continue Reading

Poll: Employees Clueless About Social Engineering

Fresh from Dark reading: "When it comes to social engineering, Pogo, the central character of a long-running American comic strip, said it best. "We have met the enemy and he is us."
Continue Reading

Who Is The Most Dangerous Cyber Celebrity of 2014?

No, it's not who you think. In recent year it was always a female celebrity like Emma Watson, Heidi Klum or Cameron Diaz that lured web surfers to sites laced with malware. At the end of ...
Continue Reading

Latest Anti Phishing Working Group Report

The latest APWG report came out: "Phishers are criminal, but they do make rational decisions about how to go about their work. They’re in it for the money, and they work to make their ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews