Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

$345,000 Cyberheist Settles After Three Years Dispute

Patco Consulting was one of the first companies to seek protection via the courts after more than half a million dollars was stolen out of their bank via an account takeover by eastern ...
Continue Reading

On Competition

On competition: "Every successful startup goes through four phases in the eyes of competitors. First, they ignore you, because you're tiny and irrelevant. Then they ridicule you, because ...
Continue Reading

13 security threats to counter in 2013

ITPRO UK was early this year with their crystal ball predictions! "As the end of the year closes in on us, it's time to think about the profile of the enterprise threat surface for the ...
Continue Reading

Alarming number of merchants unaware of PCI DSS

Help Net Security had the story: The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the ...
Continue Reading

Cyberheists A Helluva Wake-up Call to Small Biz

Brian Krebs has an excellent example of a recent cyberheist. Read it and weep! The $180,000 robbery took the building security and maintenance system installer Primary Systems Inc. by ...
Continue Reading

Top 5 Spear-Phishing Attacks Targeting Executives

Twice a year, KnowBe4 publishes the Top 5 spear-phishing attacks that are used to lure executives into clicking on links or open infected attachments. We recommend sending this list to ...
Continue Reading

CyberheistNews vol2, #47

Continue Reading

CyberheistNews vol2, #46

Continue Reading

7 shortcuts To Get Your Network Hacked

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...
Continue Reading

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...
Continue Reading

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
Continue Reading

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...
Continue Reading

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/
Continue Reading

CyberheistNews vol2, #45

Continue Reading

Cyberespionage miniFlame malware discovered

Antone Gonsalves at CSOonline covered this in-depth on October 16, 2012. "Newly discovered spying malware designed to steal data from infected systems was likely built from the same ...
Continue Reading

CyberheistNews vol2, #44

Continue Reading

CyberheistNews vol2, #43

Continue Reading

CyberheistNews vol2, #42

Continue Reading

CyberheistNews vol2, #41

Continue Reading

CyberheistNews vol2, #40

Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews