Security Awareness Training Blog

Cybercrime Blog

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

The Latest Anti-Phishing Working Group Report

This week, the new APWG Global Phishing Report is being today at the Anti-Phishing Working Group meeting in Prague. This report is published every six months, detailing how phishers are ...
Continue Reading

New 2011 Report on Russian Cybercrime

Group-IB, a leading Russian cybercrime investigation and computer forensics company and LETA Group subsidiary, this week announced a 28-page report on the Russian cybercrime market in ...
Continue Reading

CyberheistNews vol 2, #19

Continue Reading

Weak passwords STILL subvert IT security

Jaikumar Vijayan over at Computerworld observed correctly: "A recent data breach that exposed the Social Security numbers of more than 280,000 people served as yet another reminder of the ...
Continue Reading

CyberheistNews vol 2 #18

Continue Reading

8 Dirty Secrets Of The IT Security Industry

Bill Brenner at CSO Magazine is quoting IBM ISS Security Strategist Joshua Corman who has been on a crusade with his 8 Dirty Secrets campaign. Here they are and I'm quoting Dirty Secret ...
Continue Reading

Scam Of The Week: 'The Evil Unsub'

An ordinary piece of spam slips through the filters, and you see a gorgeous sandy beach with palm trees. It's an enticing ad for a vacation to a tropical island, basically a big picture ...
Continue Reading

You Got Hacked! What Now?

Neil Rubenking, who has been writing about antivirus for 30 years now, came up with an excellent article about what to do when your personal email or social media account. This is a ...
Continue Reading

BYOD: 'the inmates of the asylum have control'

IT pros surveyed by Network World and SolarWinds shared a range of tactics for handling the mobile device management challenge. Mobile devices are multiplying and -- sanctioned or ...
Continue Reading

Spoiler alert: Your TV will be hacked

Last week you may have read a headline that blared "100 million TVs will be Web-connected by 2016." Regular readers of this blog know I'm always on the lookout for new threats, so the ...
Continue Reading

Pinpoint Unsavory Elements In Your Neighborhood

The Criminal Tracker app by U.S. Publications Inc says that a study by the U.S. Department of Justice has revealed that sex offenders are four times more likely to re-offend than other ...
Continue Reading

CyberheistNews vol 2, #17

Continue Reading

Antivirus is 30 years old

[caption id="" align="alignleft" width="260" caption="Vaccine"][/caption] Simon Edwards created a great blog post about this April 12, 2012. He started out with: " Once upon a time, ...
Continue Reading

Video: How a crimepack works

Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...
Continue Reading

SMS-controlled Malware Hijacks Android Phones

Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...
Continue Reading

99 Percent Of Malicious Action Starts On Workstations

Roger Grimes made this remark on InfoWorld when he commented on the 2012 Verizon Data Breach Investigations Report that was released last week. What he said was: "You should enable event ...
Continue Reading

AV Vendor claims 600,000 Infected Macs in Botnet

The CSO website reported: "A Mac trojan horse spotted by security analysts since last year has infected more than 600,000 Apple computers, says Dr. Web, a Russian antivirus vendor. Apple ...
Continue Reading

If You Do The Cyber Crime, Expect To Do The Time

Roger Grimes at InfoWorld observes something encouraging..."Every public speaker and writer likes a good catchphrase or refrain that will grab the audience's attention. One of mine: ...
Continue Reading

CyberheistNews Vol 2, #15

Continue Reading

Finally Defined: 'Advanced Persistent Threat'

[caption id="" align="alignleft" width="650" caption="Advanced Persistent Threat"][/caption]
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews