Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

VCs Validate Security Awareness Training

I am very encouraged to see our friends at PhishMe getting 2.5 Million in Venture money to expand their business. With this new investment, Christopher Steed, Vice President at Paladin ...

On Competition

On competition: "Every successful startup goes through four phases in the eyes of competitors. First, they ignore you, because you're tiny and irrelevant. Then they ridicule you, because ...

13 security threats to counter in 2013

ITPRO UK was early this year with their crystal ball predictions! "As the end of the year closes in on us, it's time to think about the profile of the enterprise threat surface for the ...

Alarming number of merchants unaware of PCI DSS

Help Net Security had the story: The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the ...

How a Coca-Cola Exec Fell for a Hacker's E-mail Trick

In the annals of what-was-I-thinking moments in computer security, this has to be one of the most gobsmacking. According to a Bloomberg News investigation of a series of undisclosed ...

7 shortcuts To Get Your Network Hacked Final Results

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome errors a ...

Cyberheists A Helluva Wake-up Call to Small Biz

Brian Krebs has an excellent example of a recent cyberheist. Read it and weep! The $180,000 robbery took the building security and maintenance system installer Primary Systems Inc. by ...

Top 5 Spear-Phishing Attacks Targeting Executives

Twice a year, KnowBe4 publishes the Top 5 spear-phishing attacks that are used to lure executives into clicking on links or open infected attachments. We recommend sending this list to ...

CyberheistNews vol2, #47

CyberheistNews vol2, #46

The TOP 10 BYOD Gotchas

Did you know? On any given day across the globe, the number of iPhones sold will exceed the number of babies born (378,000 to 371,000) The problem is that mobile device security has not ...

Researcher Warns 'Zombie Browsers' Are Skyrocketing

Ellen Messmer at Network World covered this one: "Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's ...

2013 Security Awareness Training Survey

I just recevied some interesting information. SearchSecurity.com surveyed IT professionals about their end-user security training purchase intentions for 2013. The numbers are revealing. ...

7 shortcuts To Get Your Network Hacked

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...

Why We Are Doing This

Some of you might remember Sunbelt Software, which from 1996 to 2010 sold system admin and security tools for Windows Server. I am one of the two co-founders of Sunbelt. After ...

Cybergeddon - New Web Series Sponsored By Symantec

[caption id="Cybergeddon" align="aligncenter" width="570"]Missy Peregrym in the Yahoo Web series Cybergeddon Still from Cyberteddon © Yahoo. All rights reserved.[/caption] Not sure how I ...

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...

What Is The Top Phishing Day Of The Week? And Why?

[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.