Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

I was just interviewed on TV about the JP Morgan Hack

Tampa TV station 10News WTSP interviewed me about the JP Morgan Hack. You can see the short clip here:
Continue Reading

CyberheistNews Vol 4, 41 Scam of the Week: "Whatsapp Gold" & Security News Roundup

CyberheistNews Vol 4, # 41
Continue Reading

Why All This Russian Cybercrime in Five Minutes

We all know that a large amount of cybercrime originates in Russia and other eastern European countries that were former USSR states. But why is that? I decided to dig into this and did ...
Continue Reading

CyberheistNews Vol 4, # 40 Most Dangerous Cyber Celebrity of 2014?

CyberheistNews Vol 4, # 40
Continue Reading

CryptoWall 2.0 Ransomware Moves to TOR network

A new version of the world's most widespread ransomware CryptoWall has migrated to the TOR network. It has been upgraded to version 2.0, and continues to encrypt files so that ransom can ...
Continue Reading

Poll: Employees Clueless About Social Engineering

Fresh from Dark reading: "When it comes to social engineering, Pogo, the central character of a long-running American comic strip, said it best. "We have met the enemy and he is us."
Continue Reading

Who Is The Most Dangerous Cyber Celebrity of 2014?

No, it's not who you think. In recent year it was always a female celebrity like Emma Watson, Heidi Klum or Cameron Diaz that lured web surfers to sites laced with malware. At the end of ...
Continue Reading

Latest Anti Phishing Working Group Report

The latest APWG report came out: "Phishers are criminal, but they do make rational decisions about how to go about their work. They’re in it for the money, and they work to make their ...
Continue Reading

Top 5 eLearning Statistics for 2014 [Infographic]

The rise in eLearning’s popularity isn’t showing any signs of slowing. In fact, judging by the following Top 10 eLearning statistics for 2014, the future of the eLearning Industry is ...
Continue Reading

CyberheistNews Vol 4, # 39 Home Depot Hack Turns Into Criminal Negligence Scandal

CyberheistNews Vol 4, # 39
Continue Reading

Kevin Mitnick Selling 0-day Exploits Is A Good Idea

OK, so here is my take on the recent hatchet job by WIRED Magazine.
Continue Reading

Home Depot Hack Turns Into Criminal Negligence Scandal

Wait for the class-actions lawsuits to get unleashed. The lawyers are going to be over this one like white on rice. Ex-employees from the Home Depot IT technology group are now claiming ...
Continue Reading

CyberheistNews Vol 4, # 38 Home Depot Target Breaches Exploited Old WinXP

CyberheistNews Vol 4, # 38
Continue Reading

New Android Ransomware Strain Locks The Device Twice

Researchers in Russia discovered a new Android ransomware strain which does not lock the device just once but twice. It spreads by using a social engineering trick, disguising itself as a ...
Continue Reading

Home Depot, Target Breaches Exploited Old WinXP Flaw

The massive security breaches and theft of credit card information at The Home Depot and Target have something in common. They were both allowed by a vulnerability in XP embedded that was ...
Continue Reading

Regular Facebook Users Are More Likely To Fall For Phishing Scams

Techcrunch was the first one to report on some very interesting findings:
Continue Reading

CyberheistNews Vol 4, # 37 Symantec: Crypto Ransomware Phishing Up 700 Percent in 2014

CyberheistNews Vol 4, # 37
Continue Reading

Home Depot Hit By Same Russian Hackers As Target

Right after the Target Hack, C-level execs at Home Depot Inc. put together a task force to prevent being the victim of a similar attack. The task force recommended to fully encrypt ...
Continue Reading

Symantec: Crypto Ransomware Phishing Up 700 Percent in 2014

Very interesting data from Symantec. This is fresh from the press and shows Phishing, Spam and Malware trends. There is a PDF with a whole bunch more data, but these are the most relevant ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews