Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Five Ways Your Employees Can Kill Your Company

One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...
Continue Reading

The Inevitability Of "The Click"

From the 2013 Verizon Data Breach Investigations Report. Note that i t only takes 20 emails to get one successful click on a phishing attack. Read the story above!
Continue Reading

FBI Warns of Spear-Phishing Attacks

Spear-phishing attacks are up, and they are targeting individuals across all industries, according to a new warning issued by the U.S. Federal Bureau of Investigation .
Continue Reading

CyberheistNews Vol 3, 27

CyberheistNews Vol 3, # 27
Continue Reading

How Zombie Phones Could Create a Gigantic, Mobile Botnet

Seen "World War Z" recently? Your mobile phone might soon be infected and become a zombie.
Continue Reading

Why Business Is Losing The War Against Cybercrime

Price Waterhouse (PwC) and CSO Magazine just released their 2013 State of Cybercrime Survey. It shows that lack of risk awareness means companies are poorly defended. This is their 11th ...
Continue Reading

Avoiding Dodgy Web Sites No Longer Works To Stay Safe

If in the past your way to stay safe on the Web was to not visit dodgy sites like gambling, porn, piracy or other "unsafe district" locations, that strategy no longer works. Google ...
Continue Reading

CyberheistNews Vol 3, 26

CyberheistNews Vol 3, # 26
Continue Reading

System Administrator Appreciation Day Is Coming Soon!

I wanted to make sure everyone was aware of an important, upcoming holiday. No, it is not the 4th of July (although that is almost here, too)... it's System Administrator Appreciation ...
Continue Reading

Snowden Exfiltrated NSA Files On Thumb Drive

It appears that Edward Snowden used a thumb drive to exfiltrate the Top Secret files documents from NSA's network. The US DoD banned the use of flash drives in 2008 after Defense systems ...
Continue Reading

CyberheistNews Vol 3, # 25

CyberheistNews Vol 3, # 25
Continue Reading

Scam Of The Week: CIA Prism Watchlist

Scam Of The Week: CIA Prism Watchlist Just this morning, a researcher discovered an email uploaded to Virustotal called CIA's_prism_Watchlist_.eml. The content refers to Snowden, and the ...
Continue Reading

SlideShare Puts Us On Front Page!

The super popular SlideShare site has featured our Seven Social Engineering Vices slide deck on their front page for a short time. Here is what they sent me!
Continue Reading

The Three Types Of Cyberattacks

Eugene Kaspersky recently gave one of his very rare interviews. He was in Israel for a staff recruitment tour, and was quoted saying:"
Continue Reading

Kevin And I Were on FOX TV Wednesday

Kevin Mitnick and I were both interviewed on FOX TV about how to fight hackers, and what hackers are after these days. You will see Kevin, me, the KnowBe4 office and some of the KnowBe4 ...
Continue Reading

New on SlideShare: The Seven Deadly Social Engineering Vices

The Seven Deadly Social Engineering Vices blog post has been viewed well over 11,000 times and has gone viral. That's why we created a (much prettier) SlideShare version for you which you ...
Continue Reading

New Top 10 IT Security Myths That Put You At Risk

Continue Reading

CyberheistNews Vol 3, # 24

CyberheistNews Vol 3, # 24
Continue Reading

POLL: "YOU are in IT. Is it OK what the NSA is doing?"

A new Washington Post-Pew Research Center poll asked Americans if they consider the NSA's practice of obtaining telephone calls and email through secret court orders "acceptable." As the ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews