Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/

CyberheistNews vol2, #45

Cyberespionage miniFlame malware discovered

Antone Gonsalves at CSOonline covered this in-depth on October 16, 2012. "Newly discovered spying malware designed to steal data from infected systems was likely built from the same ...

FBI has new Cyber Safety Website

10/15/12 - the FBI announced a new initiative: "With school back in session, one topic that’s on many class curriculums around the nation is cyber safety. After all, it’s a ...

CyberheistNews vol2, #44

CyberheistNews vol2, #43

CyberheistNews vol2, #41

CyberheistNew vol2, #37

CyberheistNews vol2, $36

CyberheistNews vol2, #35

Prepaid Cards Go Mainstream - Watch For New Scams

[caption id="" align="alignleft" width="270" caption="Bluebird prepaid card"][/caption] Wal-mart and American Express have started a joint venture to sell prepaid Bluebird cards, stamped ...

Hackers exploit Skype API to infect Windows PCs

Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...

Defending Against Phishing Attacks

By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...

How long should it be?

We asked people which topics they thought were important to protect their family online. They gave us eight major areas that they wanted to learn more about. We are creating a course ...

Scam Of The Week You Have Been Targeted For Assasination

The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...

Ex-Sunbelter Joins ex-Hacker Mitnick in Anti-Hacker Training

Doug Barney, Editor in Chief of Redmond Magazine did a write-up about our new Kevin Mitnick Security Awareness Training, which was pretty fun. You can read his blog post here

Beware Of iPhone Delivery Phishes

Hackers have a great new reason to send you a UPS notification regarding your new iPhone 5 shipment. In times like this – when people are eagerly waiting for an email of this type – the ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.