Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Google to warn users of 'state-sponsored' hacking

The Guardian reported that Google will warn users of 'state-sponsored' hacking: "Search giant says it will alert Gmail users about targeted attacks, in move that could aid human rights ...
Continue Reading

CHANGE YOUR LINKEDIN PASSWORD NOW

LinkedIn was hacked and 6.46 million encrypted passwords have been leaked on a Russian forum. This is not good, as the encrypted passwords are relatively easy to crack. If you are using ...
Continue Reading

Make 30 Bucks In 30 Minutes!: Beta Test

[caption id="" align="alignleft" width="260" caption="30 Bucks In 30 Minutes"][/caption]We need immediate Beta Testers for our Internet Security Awareness Training! This is a THIS WEEKEND ...
Continue Reading

CyberheistNews Vol 2, #24

Continue Reading

CyberheistNews Vol 2, #23

Continue Reading

CyberheistNews Vol 2, #22

Continue Reading

Norton Protects Against Flame?

[caption id="" align="alignleft" width="260" caption="Norton Protects Against Flame?"][/caption] The antivirus industry is making hay with the new Flame malware, but Symantec marketing is ...
Continue Reading

Chinese hacker brings grief to Calgary’s Catholic school system

Hackers will find any mail server that is not protected and/or configured correctly and use it to send out as much spam as possible. This gets the unsuspecting organization blacklisted ...
Continue Reading

Ten years of Windows malware

Ed Bott wrote a truly excellent article over at ZDNet where he describes the history of Windows Malware, which shows on the very first slide that most malware is installed via social ...
Continue Reading

Gmail Security Hole Allows Hackers To Automate Social Engineering Trick

Christopher Mims over at Technology Review was the first one to report on this. A large Gmail security hole could lead to mass harvesting of accounts, as hackers can automate this social ...
Continue Reading

Russia's most effective cybercriminals

Rod Rasmussen over at SecurityWeek has a really interesting article about a Russian cyber gang driving a massive wave of fraud: "Tucked away in a small town outside Moscow, Russia one of ...
Continue Reading

I am a malware coder and botnet operator

This is a discussion on Reddit, where a (presumably Polish) malware coder and botnet operator very candidly answers questions from people. This is a fascinating but rather technical read, ...
Continue Reading

CyberheistNews Vol 2, #21

Continue Reading

News - FBI warns against malware installed via hotel networks

The Internet Crime Complaint Center had this 'Intelligence Note': "Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers ...
Continue Reading

Interpol President: "80% of Internet Crime Is Organized International Gangs."

Fresh from Yahoo News by Steve Weizman: "Interpol president Khoo Boon Hui said on Tuesday that organised international gangs are behind most internet scams and that cyber crime's ...
Continue Reading

The Average Cyberespionage Attack Goes On For 416 Days

WIRED Mag has a great article by Kim Zetter. It boils down to the fact that high-level hackers are able to get and stay in your network. And even if you are able to kick them out, they ...
Continue Reading

The evolution of Business Cards

I just got a 'perk' over at the Klout site, which gives you a score how you do in Social Media. The perk was 50 business cards, each with a different backside if you want to. The company ...
Continue Reading

Symantec Report Says User Behavior is Root of Most Breaches

Tracy Kitten over at BankInfoSecurity spotted something interesting in Symantec's recent Internet Security Threat Report. This is the upshot: "Which Internet security threats pose the ...
Continue Reading

No Exploit Required: How Attackers Exploit Business Logic Flaws

Kelly Jackson Higgins over at Dark Reading had a very interesting article: "Cyberattacks don't always employ exploited vulnerabilities: Sometimes they prey on weaknesses in the business ...
Continue Reading

$1,000 Walmart Gift Card Scam Inflates Your Phone Bill

We have seen crooked Walmart gift card offers before, but now and then I run across one that's craftier than earlier versions. And as usual, you do not get the gift card, but a high dose ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews