Human Risk Management Blog

Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

CyberheistNews vol2, #40

CyberheistNews vol2, #39

CyberheistNew vol2, #38

CyberheistNew vol2, #37

CyberheistNews vol2, $36

CyberheistNews vol2, #35

Prepaid Cards Go Mainstream - Watch For New Scams

[caption id="" align="alignleft" width="270" caption="Bluebird prepaid card"][/caption] Wal-mart and American Express have started a joint venture to sell prepaid Bluebird cards, stamped ...

Hackers exploit Skype API to infect Windows PCs

Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...

Defending Against Phishing Attacks

By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...

How long should it be?

We asked people which topics they thought were important to protect their family online. They gave us eight major areas that they wanted to learn more about. We are creating a course ...

Scam Of The Week You Have Been Targeted For Assasination

The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...

Ex-Sunbelter Joins ex-Hacker Mitnick in Anti-Hacker Training

Doug Barney, Editor in Chief of Redmond Magazine did a write-up about our new Kevin Mitnick Security Awareness Training, which was pretty fun. You can read his blog post here

Beware Of iPhone Delivery Phishes

Hackers have a great new reason to send you a UPS notification regarding your new iPhone 5 shipment. In times like this – when people are eagerly waiting for an email of this type – the ...

I was quoted on CNNMoney re mobile security

[caption id="" align="alignleft" width="230" caption="Mobile Security"][/caption] NEW YORK (CNNMoney) -- Security experts have warned for years that our smartphones are due for a major ...

1-Minute-Internet-Security-Survey

Could you do us a big favor? Spend one minute! We asked people which things they thought were important for Internet Security at the house. In other words, what they thought was needed to ...

5 BYOD Deployment Rules

(1) To start off with, have a BYOD project leader that has the authority to enforce the required policies, procedures, and training to get BYOD implemented securely.

How I Bought 1,000 Twitter Followers

September 9, 2012 -- I have been a fan of Mike Elgan for years. He's often able to put his finger on the sore spot and boy this spot hurts for some people! He lists a new class of ...

KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay

KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay I was interviewed as a panel member at the Front Row Tampa Bay event during the 2012 RNC in Tampa, FL about the benefits of ...

Fake AmEx "Security Verification"

* Scam Of The Week: Fake AmEx "Security Verification" Phishing attacks come in waves. Old ones get "refurbished" and sent out again after several months. Shiny new ones are cooked up all ...

IT's 9 Biggest Security Threats

[caption id="" align="aligncenter" width="250" caption="9 Biggest Security Threats"][/caption] By now you probably know I am a fan of Roger Grimes. He's a highly skillled security veteran ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.