Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Why you shouldn’t connect to just any free Wi-Fi

Our friends at MalwareBytes put up a great blog post that explains in detail why you should not just connect to any free Wi-Fi. The risk is that you will connect to a hostile Wi-Fi access ...

CyberheistNews Vol 3, # 47

CyberheistNews Vol 3, # 47

Edward Snowden Used Social Engineering To Hack NSA

Ex-NSA contractor Edward Snowden used user names and passwords that colleagues at a spy base in Hawaii gave him to access some of the classified material he exfiltrated. Around 20-25 ...

CyberheistNews Vol 3, # 46

CyberheistNews Vol 3, # 46

CyberheistNews Vol 3, # 45

CyberheistNews Vol 3, # 45

CyberheistNews Vol 3, 44

CyberheistNews Vol 3, # 44

A Serious Legal Liability: Bad or No Security Awareness Training

Please read this article and then forward it to the head of your legal department or the person in your organization who is responsible for compliance. Recently, the Department of Health ...

Even the tech-savvy get their accounts hacked...

By Steve Ragan , Staff Writer at CSO wrote: "October 22, 2013 — The millennial generation, those of us who were born and raised alongside the Internet, should be wise enough to avoid ...

CyberheistNews Vol 3, 43

CyberheistNews Vol 3, # 43

Half Of Federal Security Breaches Caused By Employees

This week, MeriTalk, a public-private partnership focused on improving the outcomes of government IT, announced the results of a new report. The study compares what cyber security ...

CyberheistNews Vol 3, # 42

CyberheistNews Vol 3, # 42

Spear phishing alert: Hong Kong Monetary Authority Invoice

Experts warn that cybercriminals are using fake Hong Kong Monetary Authority invoices to distribute a piece of malware. The emails are entitled “Invoice #3404196 – Remit File” and they ...

CyberheistNews Vol 3, # 41

CyberheistNews Vol 3, # 41

More Likely to Fall for a Phishing Scam If You’re a Neurotic Woman?

Softpedia published an article I have a problem with. There is so much wrong with this that I don't even know where to start. They started out with:

Inside The Adobe Databreach Disaster

Last week Adobe announced probably the worst news ever for a tech company. Both their source code and customer lists had been stolen. EPIC FAIL!

CyberheistNews Vol 3, # 40

CyberheistNews Vol 3, # 40

Scam Of The Week: Affordable Health Care "Advisers"

Tomorrow, Tuesday October 1, 2013, the first stage of the new health care act kicks in. You can start shopping for policies on new insurance "marketplaces". There is going to be an ...

Your Employees' Identity -Has- Been Stolen

There is the expression that there are two kinds of companies. The ones that know they are hacked and the ones that don't. It's safe to assume your network has already been compromised ...

NEW Kevin Mitnick VIDEO: The Word Document Exploit

Check out a brand new 3:25 min Kevin Mitnick video where he shows live how an infected Word document allows a hacker to steal the employee's user name and password. This is just one of ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.