Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Data Breach Costs: 10 Ways You're Making It Worse

Inadequate response plans and poorly executed procedures caused data breach costs to rise significantly at some businesses, according to the Ponemon Institute. Mistakes, negligence and ...
Continue Reading

Citadel 'Shutdown' Just A Microsoft PR Move

It was all over the news. The Citadel botnet responsible for stealing more than 500 million dollars out of bank accounts from both individuals and organizations worldwide has been largely ...
Continue Reading

Did China Leak Prism Deliberately?

UPDATED June 9: 16:51p - In an interview with TechCrunch, Eugene H. Spafford, a computer science professor at Purdue and a noted expert in computer security observed something ...
Continue Reading

VIDEO: They Gave Me 90 Seconds...

Our VP Channel asked me to record a 90-second elevator pitch why next-generation security awareness training is necessary to keep your network secure. Here it is! (pant, pant...)
Continue Reading

46 Percent Of Hospital’S Hacked Money Gone For Good

Chelan County Treasurer David Griffiths says Leavenworth's hospital district stands to recover less than half the $1 million stolen in an online banking theft. About $415,000 has been ...
Continue Reading

New Fun Little Quiz: How Phish-prone Are You?

We created a fun new little quiz you could send to your users!
Continue Reading

CyberheistNews Vol 3, #23

Continue Reading

How the Syrian Electronic Army Hacked The Onion

This is a write-up of how the Syrian Electronic Army hacked The Onion using spear-phising. In summary, they phished Onion employees’ Google Apps accounts via 3 separate methods. From ...
Continue Reading

Cybercrime Targets: C-Level execs, HR managers and System Admins

According to a recent research of Group-IB on cybercrime, senior management is considered among most popular targets.
Continue Reading

Interesting Infection Danger Numbers

Symantec just released a white paper where they compared their product with 6 other enterprise endpoint security products. They had AV-Test do the review, and they included above graph to ...
Continue Reading

Top 5 System Admin Hate Votes

May 22, the question was asked on Spiceworks: "What is your IT-related arch nemesis?". More than 200 replies came in. We tabulated (and somewhat normalized) the main things that generate ...
Continue Reading

The Seven Deadly Social Engineering Vices

(updated June 17, 2015) You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have ...
Continue Reading

CyberheistNews Vol 3 #22

Continue Reading

Webroot Spots NATO Job Apps Lead To Malware

This one qualifies as a Scam Of The Week and it's a good one to forward to your employees.
Continue Reading

0-Day Threats and Security Awareness

OK, we all know that there is a lively trade in 0-day threats. Often this is an unknown vulnerability in a popular browser that is not fixed yet. Microsoft recently announced they fixed ...
Continue Reading

Your Opinion Please! Family Online Safety

Continue Reading

CyberheistNews Vol 3, # 21

CyberheistNews Vol 3, # 21
Continue Reading

End-user awareness is the missing link in cyber security

This article appeared originally at Government Security News Fri, 2013-05-17 03:56 PM By: Megan Horner Megan Horner Nobody can argue that cyber security and data privacy have become hot ...
Continue Reading

Phishing Scam Of The Week: Walmart.com

Wal-Mart took special effort this week and warned customers of an unusually 'high quality' phishing email that tries to get personal and credit information. They stated on their corporate ...
Continue Reading

Cybercrime Attack Vector Of Choice: Employees

Today, employees are the low hanging fruit for cybercrime. Organizations counter this with what is called 'Security Awareness Training' (SAT), but modern SAT is far removed from how it ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews