Human Risk Management Blog

Cybercrime

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

CyberheistNews vol2, 48

$345,000 Cyberheist Settles After Three Years Dispute

Patco Consulting was one of the first companies to seek protection via the courts after more than half a million dollars was stolen out of their bank via an account takeover by eastern ...

On Competition

On competition: "Every successful startup goes through four phases in the eyes of competitors. First, they ignore you, because you're tiny and irrelevant. Then they ridicule you, because ...

13 security threats to counter in 2013

ITPRO UK was early this year with their crystal ball predictions! "As the end of the year closes in on us, it's time to think about the profile of the enterprise threat surface for the ...

Alarming number of merchants unaware of PCI DSS

Help Net Security had the story: The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the ...

Cyberheists A Helluva Wake-up Call to Small Biz

Brian Krebs has an excellent example of a recent cyberheist. Read it and weep! The $180,000 robbery took the building security and maintenance system installer Primary Systems Inc. by ...

Top 5 Spear-Phishing Attacks Targeting Executives

Twice a year, KnowBe4 publishes the Top 5 spear-phishing attacks that are used to lure executives into clicking on links or open infected attachments. We recommend sending this list to ...

CyberheistNews vol2, #47

CyberheistNews vol2, #46

7 shortcuts To Get Your Network Hacked

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/

CyberheistNews vol2, #45

Cyberespionage miniFlame malware discovered

Antone Gonsalves at CSOonline covered this in-depth on October 16, 2012. "Newly discovered spying malware designed to steal data from infected systems was likely built from the same ...

CyberheistNews vol2, #44

CyberheistNews vol2, #43

CyberheistNews vol2, #42

CyberheistNews vol2, #41


Get the latest insights, trends and security news. Subscribe to CyberheistNews.