Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

News - FBI warns against malware installed via hotel networks

The Internet Crime Complaint Center had this 'Intelligence Note': "Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers ...
Continue Reading

Interpol President: "80% of Internet Crime Is Organized International Gangs."

Fresh from Yahoo News by Steve Weizman: "Interpol president Khoo Boon Hui said on Tuesday that organised international gangs are behind most internet scams and that cyber crime's ...
Continue Reading

The personal cloud will eclipse the PC

The personal cloud is poised to eclipse the PC as the hub of consumers' digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm for how people ...
Continue Reading

The Average Cyberespionage Attack Goes On For 416 Days

WIRED Mag has a great article by Kim Zetter. It boils down to the fact that high-level hackers are able to get and stay in your network. And even if you are able to kick them out, they ...
Continue Reading

The evolution of Business Cards

I just got a 'perk' over at the Klout site, which gives you a score how you do in Social Media. The perk was 50 business cards, each with a different backside if you want to. The company ...
Continue Reading

Symantec Report Says User Behavior is Root of Most Breaches

Tracy Kitten over at BankInfoSecurity spotted something interesting in Symantec's recent Internet Security Threat Report. This is the upshot: "Which Internet security threats pose the ...
Continue Reading

No Exploit Required: How Attackers Exploit Business Logic Flaws

Kelly Jackson Higgins over at Dark Reading had a very interesting article: "Cyberattacks don't always employ exploited vulnerabilities: Sometimes they prey on weaknesses in the business ...
Continue Reading

$1,000 Walmart Gift Card Scam Inflates Your Phone Bill

We have seen crooked Walmart gift card offers before, but now and then I run across one that's craftier than earlier versions. And as usual, you do not get the gift card, but a high dose ...
Continue Reading

How To Land A Cybersecurity Job

Just found an article in NetworkWorld by Carolyn Duffy Marsan that is very interesting. Here is a snippet: "One specific skill related to cloud security that's in demand: SAML. The ...
Continue Reading

Proof: Antivirus Only Defends Against Low-skilled Attackers

The SANS Computer Forensics and Incident Response team built a real-life network for their students so they could learn how to hack into the network. They put McAfee enterprise endpoint ...
Continue Reading

Scam Of The Week: Fake Storage Upgrades

Phishers are now offering fake storage upgrades. Symanted reported: "Customers of popular email service providers have been a common target for phishers for identity theft purposes. ...
Continue Reading

CISPA fight far from over. A Guide To The Cybersecurity Bill Alphabet Soup

Stefanie Hoffman over at Fortinet took the time to summarize the current cybersecurity bills. This fight is far from over, so you might want to take a look at what's cooking at Capitol ...
Continue Reading

CyberheistNews vol 2, #20

CyberheistNews Vol 2, #20 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Warn Your Users: NY Traffic Ticket Phish This phish is a ...
Continue Reading

Bogus PayPal payment alert causes malware infection

Gary Warner just reported: "A new malicious spam campaign has just launched this morning targeting Paypal users. This malware campaign attempts to "social engineer" users into clicking a ...
Continue Reading

Cybercrime uses hidden file extensions to trick users

Symantec contributor Fred Gutierrez shows clearly in this blog post why it can be deadly to click on a .JPG file: "Cybercriminals have continuously evolved their methods throughout the ...
Continue Reading

Make sure 'challenge questions' aren't a backdoor into your account!

The Lookout Mobile Security Blog pointed out something important. Patty talked about the man who hacked hollywood: "Finding a working e-mail address was a simple process of trial and ...
Continue Reading

Omaha cast net that caught cyberthieves

Matthew Hansen, World-Herald Staff Writer just wrote a great article that illustrates what I have been warning about these last years. It starts out like this: "Imagine for a moment that ...
Continue Reading

Hacking The Hackers: A Counter-Intelligence Operation

Marc Weber Tobias, a contributor to Forbes Magazine wrote a very interesting article: "One of our security lab team members is an ex-cyberspook who spent his career in the military doing ...
Continue Reading

2012 Doomsday Scam Continues to Serve up Doom, Giftcards

Chris Boyd over at GFI wrote: "If we survive the Mayan Apocalypse of 2012, does that mean we’re technically immortals? I’ve no idea, but it will probably mean we don’t see quite as many ...
Continue Reading

How to Start an IT Security Awareness Program

Mike Chapple is an IT professional and assistant professor of computer applications at the University of Notre Dame. He wrote at biztechmagazine:"Are your users aware of their ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews