Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Want To Make A Thousand Bucks? Refer A Salesrep To KnowBe4

KnowBe4 will pay anyone a thousand bucks for a referral that gets us a good sales rep!

CyberheistNews Vol 4, # 20 CryptoLocker Goes Spear-Phishing

CyberheistNews Vol 4, # 20

And in THIS corner we have Dave

I thought you would enjoy this cartoon! LOL Stu

CryptoLocker Goes SpearPhishing

You may be familiar with a site called Spiceworks. They have free system admin and network management software, and their business model is advertising to the hundreds of thousands that ...

Elite Hackers Develop Cybercrime Attack Kits As Market Matures

Today, in the Wall Street Journal, an article told the story of a software product called blackshades that experts call a "rat" (Remote Access Trojan) which was commercially sold to cyber ...

Scam Of The Week: Fake Purchase Orders

This could be a very expensive scam to fall for, so keep on reading.

Microsoft to XP You Are Dead To Us

Microsoft to XP: "You Are Dead To Us". This week, Redmond reminded all of us still running XP that we would not receive security updates on Patch Tuesday or any future patches of any kind.

NISTs New Approach to Cybersecurity Standards

Applying Engineering Values to IT Security. The National Institute of Standards and Technology is developing new cybersecurity standards based on the same principles engineers use to ...

Whitelisting Community Preview: MalwareShield

You have heard me talk about whitelisting the last few years. Well I have some news! You may not know that most of us here at KnowBe4 are ex-antivirus people who came from the Sunbelt ...

CyberheistNews Vol 4, # 19 Scam Of The Week: Mobile Ransomware

CyberheistNews Vol 4, # 19

Are You Being Targeted By Hot Foreign Spies?

Ready to be hit upon by the likes of Anna Chapman? MI5 in the UK warned that foreign spy agencies are targeting IT workers within big organizations as a means of gaining privileged access ...

Malware Only Lives For A Few Hours

Rob Rachwald and Zheng Bu at FireEye came up with some interesting observations: "At FireEye, we look at hundreds of malware samples daily, and, in a recent talk at RSA Conference, Zheng ...

Scam Of The Week: Mobile Apps As Phishing Lures

The bad guys use social engineering to make end-users click on links, and their scams rely mostly on exploiting trust. If they can make you believe a message is from a trusted source, ...

CyberheistNews Vol 4, # 18_Antivirus Is Dead

CyberheistNews Vol 4, # 18

Shocker Symantec Admits That Antivirus Is Dead

An article in the Wall Street Journal of May 5, 2014 summarized what I have been talking about these last few years. 25 years ago, Symantec was one of the first IT security companies to ...

Phishing campaign uses VoIP to steal card data

An Eastern European Cyber Mafia has been found to run a multi-year campaign that targets small U.S. banks and credit unions with a sophisticated VoIP phishing scheme (aka vishing) to ...

CyberheistNews Vol 4, # 17 WARNING Third Ransomware Strain

CyberheistNews Vol 4, # 17

Verizon's New 2014 Data Breach Report: Summary

In IT, we are subject to help desk tickets and putting out fires. The problem with this is that most of these are short-term fixes. It is usually about last week's downtime, today's ...

WARNING Third Ransomware Strain Called CryptorBit Attacks

Welcome to the new world of malware.

CyberheistNews Vol 4, # 16 Scam Of The Week: XP Phishing Threat

CyberheistNews Vol 4, # 16


Get the latest insights, trends and security news. Subscribe to CyberheistNews.