Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

How to Phish Your Own Users And Why

Over the last few years, thousands of organizations in the U.S have started to phish their own users. IT pros have realized that doing this is urgently needed as an additional security ...
Continue Reading

Bitdefender Releases Cryptowall 4.0 Ransomware Vaccine

Right after a new, badder version 4.0 of CryptoWall came out, Romanian security company Bitdefender has released a vaccine they claim will block ransomware infections. Andra Zaharia of ...
Continue Reading

CyberheistNews Vol #5 #48 New Triple Threat Chimera: Ransomware, Extortion And Data Breach

OK, Heads Up! This has not hit U.S. shores yet, but it's just a matter of time. This nasty bit of crimeware is being beta-tested in Germany at the moment, and that is where the reports ...
Continue Reading

FFIEC warns of increased ransomware attacks

Ransomware continues to be a source of worry and now U.S. regulatory agencies are getting in the fray. The Federal Financial Institutions Examination Council (FFIEC) published a statement ...
Continue Reading

New Triple Threat Chimera: Ransomware, Extortion And Data Breach

OK, Heads Up! This has not hit U.S. shores yet, but it's just a matter of time. This nasty bit of crimeware is being beta-tested in Germany at the moment, and that is where the reports ...
Continue Reading

CryptoWall v4.0 released: Now encrypts the file names as well

Lawrence Abrams from the famous bleepingcomputer site wrote at Spiceworks: "CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a ...
Continue Reading

CyberheistNews Vol #5 #47 CryptoWall Damage 325 Million - FBI says: "Just Pay the Ransom"

A brand new report from the Cyber Threat Alliance (CTA) showed the staggering damage caused by a single Eastern European cyber mafia. The CTA is an industry group with big-name members ...
Continue Reading

KnowBe4 Halloween 2015

We had a great time this year, but we had to keep it short because it was the last day of the month and things were super busy! We did have some time for our yearly parade to the local ...
Continue Reading

Staggering CryptoWall Ransomware Damage: 325 Million Dollar

A brand new report from Cyber Threat Alliance showed the staggering damage caused by a single criminal Eastern European cyber mafia. The CTA is an industry group with big-name members ...
Continue Reading

CyberheistNews Vol 5 #46 Beautiful Social Engineering Attack By Gorgeous IBM Rep

Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, product designs and other trade secrets ...
Continue Reading

FBI’s Advice on Ransomware? Just Pay The Ransom.

In-brief: The nation’s top law enforcement agency is warning companies that they may not be able to get their data back from cyber criminals who use Cryptolocker, Cryptowall and other ...
Continue Reading

TalkTalk Hackers Demanded $122K in Bitcoin

TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial ...
Continue Reading

Scam Of The Week: Enter To Win Tickets To Star Wars

It's "Scam Of The Week" time to warn your users against phishing attacks that try to trick them into winning movie tickets for the new Star Wars movie. For the next 2 months this is going ...
Continue Reading

Beautiful Social Engineering Attack By Gorgeous IBM Rep

Credit card numbers are small potatoes. Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, ...
Continue Reading

Ransomware Spreads Using Remote Desktop and Terminal Services Attacks

Larry Abrams at tech blog Bleeping Computer was the first one to report on this new wrinkle. The ransomware is called LowLevel04 and encrypts data using RSA-2048 encryption, the ransom is ...
Continue Reading

CyberheistNews Vol #5 #45

CyberheistNews Vol #5 #45 Oct 20, 2015 Apple's OS X Security Honeymoon Is Over Unfortunately, bad guys are business people too. Their time is money, and they follow market leaders. By ...
Continue Reading

Stop End-Users From Doing Stupid Stuff

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and ...
Continue Reading

[VIDEO] Hacking the Chip & Pin card technology is easy

The banks are promoting that the so called new "Chip & Pin" cards are much safer. They are also called the EMV chip system and touted to be secure. However, this technology is 15 ...
Continue Reading

Apple's OS X Security Honeymoon Is Over

Unfortunately, bad guys are business people too. Their time is money, and they follow market leaders. By now, Apple's market share of desktop computers is close to 17 percent. OS X, ...
Continue Reading

Healthcare pros do not get enough security awareness training

Healthcare pros surprisingly get very little security awareness training. Only 38 percent of these employees get security training at least twice a year -- 49 percent get training once a ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews