Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

CyberheistNews vol2, #46

The TOP 10 BYOD Gotchas

Did you know? On any given day across the globe, the number of iPhones sold will exceed the number of babies born (378,000 to 371,000) The problem is that mobile device security has not ...

Researcher Warns 'Zombie Browsers' Are Skyrocketing

Ellen Messmer at Network World covered this one: "Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's ...

2013 Security Awareness Training Survey

I just recevied some interesting information. SearchSecurity.com surveyed IT professionals about their end-user security training purchase intentions for 2013. The numbers are revealing. ...

7 shortcuts To Get Your Network Hacked

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...

Why We Are Doing This

Some of you might remember Sunbelt Software, which from 1996 to 2010 sold system admin and security tools for Windows Server. I am one of the two co-founders of Sunbelt. After ...

Cybergeddon - New Web Series Sponsored By Symantec

[caption id="Cybergeddon" align="aligncenter" width="570"]Missy Peregrym in the Yahoo Web series Cybergeddon Still from Cyberteddon © Yahoo. All rights reserved.[/caption] Not sure how I ...

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...

What Is The Top Phishing Day Of The Week? And Why?

[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/

CyberheistNews vol2, #45

Cyberespionage miniFlame malware discovered

Antone Gonsalves at CSOonline covered this in-depth on October 16, 2012. "Newly discovered spying malware designed to steal data from infected systems was likely built from the same ...

FBI has new Cyber Safety Website

10/15/12 - the FBI announced a new initiative: "With school back in session, one topic that’s on many class curriculums around the nation is cyber safety. After all, it’s a ...

CyberheistNews vol2, #44

CyberheistNews vol2, #43

CyberheistNews vol2, #42

CyberheistNews vol2, #41


Get the latest insights, trends and security news. Subscribe to CyberheistNews.