Human Risk Management Blog

Cybercrime

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

How to Find if a Website Is Legitimate

1) Call, write, or email the website using the contact information provided on their website to check for legitimacy. If you reach an automated voice messaging system, find that the ...

Guy Gets SWAT Team-ed for Not Securing His Wireless Network

Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need ...

ex-hacker jolts learners into changing behavior

Articulate is a company that produces software that allows organizations to create online training courses. KnowBe4 uses the Articulate products for the Kevin Mitnick Security Awareness ...

Mass phishing emails a thing of the past?

The net-security website reported: "PhishMe predicts that phishers will be changing their tactics in 2013 – resorting to targeted spear phishing emails rather than the mass mails of the ...

CyberheistNews vol2, #52

Online Service Offers Bank Robbers for Hire

An online service boldly advertised in the cyber underground lets miscreants hire accomplices in several major U.S. cities to help empty bank accounts, steal tax refunds and intercept ...

CyberheistNews vol2, #51

CyberheistNews vol2, #49

CyberheistNews vol2, 48

$345,000 Cyberheist Settles After Three Years Dispute

Patco Consulting was one of the first companies to seek protection via the courts after more than half a million dollars was stolen out of their bank via an account takeover by eastern ...

On Competition

On competition: "Every successful startup goes through four phases in the eyes of competitors. First, they ignore you, because you're tiny and irrelevant. Then they ridicule you, because ...

13 security threats to counter in 2013

ITPRO UK was early this year with their crystal ball predictions! "As the end of the year closes in on us, it's time to think about the profile of the enterprise threat surface for the ...

Alarming number of merchants unaware of PCI DSS

Help Net Security had the story: The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the ...

Cyberheists A Helluva Wake-up Call to Small Biz

Brian Krebs has an excellent example of a recent cyberheist. Read it and weep! The $180,000 robbery took the building security and maintenance system installer Primary Systems Inc. by ...

CyberheistNews vol2, #47

CyberheistNews vol2, #46

7 shortcuts To Get Your Network Hacked

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] Today, October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome ...

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.