Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Security experts say law firms are perfect targets for hackers

Susan Hansen at Bloomberg business reported that cyber attacks upend the attorney-client privilege.
Continue Reading

Ransomware: Pay Up Or Fight. What Would You Do?

Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands ...
Continue Reading

CyberheistNews Vol 5 #11 Ransomware: Pay Up Or Fight. What Would You Do?

Ransomware: Pay Up Or Fight. What Would You Do? Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade ...
Continue Reading

Report: 71 percent successfully spear-phished in 2014

Adam Greenberg at SC Magazine reported on something interesting:
Continue Reading

Spear Phishing Attack Nearly Costs FL City $500K

A spear-phishing last month at Orange Park City Hall almost got away with $500,000 from the city's bank account. Fortunately it was caught in time so that a wire transfer that already had ...
Continue Reading

Scam Of The Week: Phishing For Apple Watch

This week, Apple had their big Apple Watch release event, and the press is full of news about the models and pricing. Pundits are sprinkling their predictions about features and future ...
Continue Reading

CEO Fraud Social Engineering Scam On The Rise

Known variously as the “CEO fraud,” or the “business email compromise,” highly sophisticated cyber criminals try to social engineer businesses that work with foreign suppliers. This ...
Continue Reading

CyberheistNews Vol 5 #10 New CryptoWall Attack Wave Using Help Files / Scam Of The Week

New CryptoWall Attack Wave Using Help Files / Scam Of The Week A new CryptoWall attack wave has hit end-users with malicious .chm attachments that infect networks with the latest and most ...
Continue Reading

New Ransomware CryptoFortress Encrypts Unmapped Network Shares

Used to be that ransomware only looked at hard drive C:, and then any other mapped drives like D:, E:, F: etc., but now a whole new malicious strain that has stolen the same look & ...
Continue Reading

New CryptoWall Attack Uses Malicious Help File Attachments

A new CryptoWall attack wave has hit end-users with phishing emails containing malicious .chm attachments that infect networks with the latest and most sophisticated file-encrypting ...
Continue Reading

Anatomy of a ransomware attack [Infographic]

How does ransomware actually work? Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data ...
Continue Reading

CyberheistNews Vol 5 #9 Mar 3, 2015 How To Get The OK To Phish Your Own Employees

CyberheistNews Vol 5 #9 Mar 3, 2015 How To Get The OK To Phish Your Own Employees IT people responsible for network security talk to us all the time. Almost all of them agree that ...
Continue Reading

Russia tops list of nation-state cyber threats against U.S.

I have been talking about cyber war / cyber threats from Russia on this blog for about two years now, and it looks like I was on the mark.
Continue Reading

How To Get The OK To Phish Your Own Employees

IT people responsible for network security talk to us all the time. Almost all of them agree that end-users are their number one headache and managing that problem continues to be a big ...
Continue Reading

Number One Infosec Headache Is End Users

Continue Reading

CyberheistNews Vol 5 #8 | Two Disgusting Scams Of The Week: Death And Taxes

Scam Of The Week #1: Death In The Family Cybercrime is innovating on a known and disgusting scam; preying on people that have recently suffered a loss. Used to be that old time scam ...
Continue Reading

Intel Report About Social Engineering

In a new report, Hacking the Human OS, McAfee (owned by Intel) security researchers Raj Samani and Charles McFarland found that, increasingly, hackers are using social engineering ...
Continue Reading

Scam Of The Week: Death In The Family

Cybercrime is innovating on a known and disgusting scam; preying on people that have recently suffered a loss. Used to be that old time scam artists read the obituary notices in the ...
Continue Reading

Just Got A Social Engineering Call That The IRS Is Suing Me

This morning, Feb 20, 2015 at 8am at the house I received a robo-call in a female voice that said the following:
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews