Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Interview on RNC Cyber Crime - Stu Sjouwerman on Tampa CBS - WTSP

http://www.youtube.com/watch?v=dultIFSgQS0&feature;=youtu.be This week, (very very early) Monday morning I was interviewed at the local Tampa CBS affiliate WTSP. We are getting the ...
Continue Reading

CyberheistNews vol2, #34

CyberheistNews Vol 2, #33 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Olympics Scam Roundup The bad guys are at it again! Please ...
Continue Reading

Interview with Kevin Mitnick on SMB security

[caption id="" align="alignleft" width="140" caption="Kevin Mitnick Interview"][/caption] Kevin Mitnick was interviewed by Spiceworks' Nicholas Tolstoshev: "When Stu Sjouwerman from ...
Continue Reading

New Cracking Tool Released At Defcon

[caption id="" align="alignleft" width="300" caption="Defcon Cracking Tools"][/caption] Some pretty interesting cracking tools were released this week at Defcon in Vegas. Moxie ...
Continue Reading

CyberheistNews vol2, #33

Continue Reading

CyberheistNews vol2, #31

CyberheistNews Vol 2, #31 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] Released! Kevin Mitnick Security Awareness Training
Continue Reading

CyberheistNews vol2, #30

Continue Reading

CyberheistNews vol2, #29

CyberheistNews Vol 2, #29 Editor's Corner [caption id="attachment_1367" align="alignleft" width="150" caption="Stu"][/caption] 15 Social Media Scams Not just -one- Scam of the week, but a ...
Continue Reading

CyberheistNews vol2, #28

Continue Reading

CyberheistNews vol2, #26

Continue Reading

Scam Of The Week: Online Dating

[caption id="" align="alignleft" width="350" caption="Online Dating Scam"][/caption] Beware, another honey trap is doing the rounds trying to snare people. Dancho Danchev was the one to ...
Continue Reading

Who IS This Yahoo?

[caption id="" align="alignleft" width="190" caption="Dave Aitel"][/caption] A bunch of people asked me this, and sent me the link to Dave Aitel's blog post which he titled: "Why you ...
Continue Reading

Cyberheist Smokescreen; : Email, Phone, SMS Floods

[caption id="" align="aligncenter" width="290" caption="Cyberheist Smokescreen"][/caption]
Continue Reading

Bank Sues Customer Over ACH/Wire Fraud

[caption id="" align="alignleft" width="180" caption="Bank Sues Customer"][/caption] Tracy Kitten at BankInfo Security reported on this: "In another legal wrangling over liability linked ...
Continue Reading

Cybercriminals Sniff Out Vulnerable Firms

[caption id="" align="aligncenter" width="560" caption="Small Firms Cyberheist Victims"][/caption] I could have written this headline myself. But I didn't, it was Sarah Needleman at the ...
Continue Reading

Cisco Cloud Calamity

[caption id="" align="alignleft" width="350" caption="Cisco Cloud Calamity"][/caption] Cisco's Linksys marketing division got themselves soaking wet. Customers that own the Linksys E2700, ...
Continue Reading

FBI: High-tech Espionage Costs 13 Billlion

Michael Cooney over at NetworkWorld came up with a number: 13. "Driven by the general ease of stealing electronically stored data and the reality of growing global businesses, US ...
Continue Reading

Scam Of The Week Payroll Phish

The nakedsecurity blog over at Sophos highlighted a new phishing scam that would be good to alert your employees about. The bad guys are pretending to be payroll processing company ADP. ...
Continue Reading

Malware Metastasizes

A few days ago I wrote about a 60 million Euro cyberheist. I have been digging into this a bit more, as it's the most advanced attack yet. Cybercrime is not revolutionary, it clearly ...
Continue Reading

KnowBe4 Philosophy

[caption id="" align="alignright" width="250" caption="KnowBe4 Philosophy"][/caption] We are happy to go against the grain. We’re not a massive developer that turns out bloatware year ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews