CyberheistNews Vol 3, # 29
CyberheistNews Vol 3, # 29
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
There is a new phishing campaign doing the rounds trying to get your Twitter login credentials. The scam arrives as a direct messages to prospective victims from one of their contacts. ...
Ira Winkler and Samantha Manke just wrote a great article at the CSO site about why security awareness programs fail. They started out with: "There is a great dichotomy in Security ...
There is a fascinating article in SC Magazine dated July 3, 2013 which tells the story of Atlantic Media Chief Technology Officer Tom Cochran, who blasted out a simulated phishing email ...
One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...
From the 2013 Verizon Data Breach Investigations Report. Note that i t only takes 20 emails to get one successful click on a phishing attack. Read the story above!
Spear-phishing attacks are up, and they are targeting individuals across all industries, according to a new warning issued by the U.S. Federal Bureau of Investigation .
Seen "World War Z" recently? Your mobile phone might soon be infected and become a zombie.
Price Waterhouse (PwC) and CSO Magazine just released their 2013 State of Cybercrime Survey. It shows that lack of risk awareness means companies are poorly defended. This is their 11th ...
If in the past your way to stay safe on the Web was to not visit dodgy sites like gambling, porn, piracy or other "unsafe district" locations, that strategy no longer works. Google ...
I wanted to make sure everyone was aware of an important, upcoming holiday. No, it is not the 4th of July (although that is almost here, too)... it's System Administrator Appreciation ...
It appears that Edward Snowden used a thumb drive to exfiltrate the Top Secret files documents from NSA's network. The US DoD banned the use of flash drives in 2008 after Defense systems ...
Scam Of The Week: CIA Prism Watchlist Just this morning, a researcher discovered an email uploaded to Virustotal called CIA's_prism_Watchlist_.eml. The content refers to Snowden, and the ...
The super popular SlideShare site has featured our Seven Social Engineering Vices slide deck on their front page for a short time. Here is what they sent me!
Eugene Kaspersky recently gave one of his very rare interviews. He was in Israel for a staff recruitment tour, and was quoted saying:"