Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Phishing: 4.5 million Community Health patients records stolen

n">(Reuters) - Community Health Systems Inc, one of the biggest U.S. hospital groups, said it was the victim of a cyber attack that originated in China, resulting in the theft of ...
Continue Reading

NSA's Monstermind Aims To Detect And Stop Cyber Attacks Instantly

WIRED magazine had the scoop, by directly talking to Edward Snowden recently. An NSA program known as MonsterMind, currently under development, is being designed to detect and stop cyber ...
Continue Reading

New CryptoLocker copycat: TorrentLocker

iSIGHT partners discovered a new ransomware strain, which uses components of CryptoLocker and CryptoWall but underneath the surface, the code is completely different from these two ...
Continue Reading

As Expected: Robin Williams 'Goodbye Video' Facebook Phishing Message

The scammers are at it, as expected. There is now a Facebook phishing message that invites users to click a link and see an "exclusive" video of Robin Williams saying goodbye through his ...
Continue Reading

Tenn. Firm Sues Bank Over $327K Cyberheist

Continue Reading

Scam Of The Week: See Robin Williams Last Words On Video

Last night, news broke that Robin Williams was found dead in his home in Marin County, CA. It is suspected that it was either a suicide or an overdose. This is a celebrity death that the ...
Continue Reading

CyberheistNews Vol 4, 32 Scam: See Robin Williams Last Words On Video

CyberheistNews Vol 4, # 32
Continue Reading

Ransomware: The next 12 months

Since September 2013, ransomware has become vicious and has inspired several copycats. At the time of this writing, summer 2014, the very first strains of second-generation ransomware ...
Continue Reading

Security Companies Help Users Recover Files Locked by CryptoLocker

Researchers at FireEye and Fox-IT have managed to obtain the private encryption keys that the malware uses to lock files.
Continue Reading

Kevin Mitnick at Black Hat 2014

I was at Black Hat 2014, and Kevin Mitnick was also at at the show. He signed 700 books in a 3-hour span, whew! Here is the line that ran all the way back to the show floor. I took this ...
Continue Reading

Scam Of The Week: "For Sale: CyberVor False Sense Of Security"

Are the credentials of one of your users among the stash of the 1.2 billion stolen passwords? A small Internet security company will tell you for just a 120 bucks per year. Their ...
Continue Reading

CyberheistNews Vol 4, # 31 Second Generation Ransomware In The Wild

CyberheistNews Vol 4, # 31
Continue Reading

Cryptolocker Ransomware Variant Hits Synology Users: Synolocker

When your products get targeted with custom made ransomware, you know you've got it made. We're talking about NAS (network-attached storage) built by Synology in Taiwan. the malware has ...
Continue Reading

The Internet of Things, Risks Of Hooking Up Appliances

This is a (very) short sci-fi story that looks at the cyber security risks of hooking up household appliances to the Internet. Warning - this is one grumpy man.
Continue Reading

Security Awareness Training blocked Ransomware Infection

ComputerWorld in Australia reported on a very nice success where security awareness training prevented a major ransomware infection. They started out with: "People like to ask the ...
Continue Reading

Is Antivirus as Vulnerable as Any Other Product?

Joxean Koret, a security researcher from the Singapore-based Coseinc, using a "fuzzer" tool he built himself, found numerous remotely exploitable vulnerabilities in multiple antivirus ...
Continue Reading

CyberheistNews Vol 4, 30 DELL Warns Against Social Engineering

CyberheistNews Vol 4, # 30
Continue Reading

KnowBe4 is hiring people for our sales team in Tampa Bay FL

KnowBe4 will pay anyone a thousand bucks for a referral that gets us a good sales rep!
Continue Reading

Heads-Up: Second Generation Ransomware In The Wild

Last week, Fedor Sinitisyn, blogger and security researcher for Kaspersky posted something worrisome. He reported that the Angler Exploit Kit was delivering a new second-generation type ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews