Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

CyberheistNews Vol 3, # 25

CyberheistNews Vol 3, # 25

Scam Of The Week: CIA Prism Watchlist

Scam Of The Week: CIA Prism Watchlist Just this morning, a researcher discovered an email uploaded to Virustotal called CIA's_prism_Watchlist_.eml. The content refers to Snowden, and the ...

SlideShare Puts Us On Front Page!

The super popular SlideShare site has featured our Seven Social Engineering Vices slide deck on their front page for a short time. Here is what they sent me!

The Three Types Of Cyberattacks

Eugene Kaspersky recently gave one of his very rare interviews. He was in Israel for a staff recruitment tour, and was quoted saying:"

Kevin And I Were on FOX TV Wednesday

Kevin Mitnick and I were both interviewed on FOX TV about how to fight hackers, and what hackers are after these days. You will see Kevin, me, the KnowBe4 office and some of the KnowBe4 ...

New on SlideShare: The Seven Deadly Social Engineering Vices

The Seven Deadly Social Engineering Vices blog post has been viewed well over 11,000 times and has gone viral. That's why we created a (much prettier) SlideShare version for you which you ...

New Top 10 IT Security Myths That Put You At Risk

CyberheistNews Vol 3, # 24

CyberheistNews Vol 3, # 24

POLL: "YOU are in IT. Is it OK what the NSA is doing?"

A new Washington Post-Pew Research Center poll asked Americans if they consider the NSA's practice of obtaining telephone calls and email through secret court orders "acceptable." As the ...

Data Breach Costs: 10 Ways You're Making It Worse

Inadequate response plans and poorly executed procedures caused data breach costs to rise significantly at some businesses, according to the Ponemon Institute. Mistakes, negligence and ...

Citadel 'Shutdown' Just A Microsoft PR Move

It was all over the news. The Citadel botnet responsible for stealing more than 500 million dollars out of bank accounts from both individuals and organizations worldwide has been largely ...

Did China Leak Prism Deliberately?

UPDATED June 9: 16:51p - In an interview with TechCrunch, Eugene H. Spafford, a computer science professor at Purdue and a noted expert in computer security observed something ...

VIDEO: They Gave Me 90 Seconds...

Our VP Channel asked me to record a 90-second elevator pitch why next-generation security awareness training is necessary to keep your network secure. Here it is! (pant, pant...)

46 Percent Of Hospital’S Hacked Money Gone For Good

Chelan County Treasurer David Griffiths says Leavenworth's hospital district stands to recover less than half the $1 million stolen in an online banking theft. About $415,000 has been ...

New Fun Little Quiz: How Phish-prone Are You?

We created a fun new little quiz you could send to your users!

CyberheistNews Vol 3, #23

How the Syrian Electronic Army Hacked The Onion

This is a write-up of how the Syrian Electronic Army hacked The Onion using spear-phising. In summary, they phished Onion employees’ Google Apps accounts via 3 separate methods. From ...

Cybercrime Targets: C-Level execs, HR managers and System Admins

According to a recent research of Group-IB on cybercrime, senior management is considered among most popular targets.

Interesting Infection Danger Numbers

Symantec just released a white paper where they compared their product with 6 other enterprise endpoint security products. They had AV-Test do the review, and they included above graph to ...

Top 5 System Admin Hate Votes

May 22, the question was asked on Spiceworks: "What is your IT-related arch nemesis?". More than 200 replies came in. We tabulated (and somewhat normalized) the main things that generate ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.