Human Risk Management Blog

Cybercrime

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Double-check that cashiers check

The fake cashier's check scam has gotten more sophisticated. Cathy Bussewitz at the pressdemocrat site reported on this one: "It usually starts when a seller posts a big-ticket item on ...

Scam Of The Week

[caption id="" align="alignleft" width="260" caption="LeakedIn"][/caption] Never 'check' your password. Change it! The last few weeks, it came to light that some major websites were ...

Survey Says: ACH Fraud Losses Down

[caption id="" align="alignleft" width="260" caption="Tracy Kitten"][/caption]It's not all bad news! Tracy Kitten over at BankInfoSecurity reported on a positive trend. "Banks are doing a ...

Half of Small Businesses Not Concerned About Security Breaches [INFOGRAPHIC]

Samantha Murphy at Mashable wrote: "Shred-It conducted a survey among 1,136 U.S. small business owners with companies of fewer than 100 employees, and 100 corporate-level executives who ...

Atomic scientists compare cyberwar to development of nuclear bomb

Foxnews reported on June 15, 2012: "Cyberbombs are the new atom bombs." "The Bulletin of the Atomic Scientists warned Friday that the race to build and deploy cyberweapons -- secret ...

CyberheistNews vol 2, #25

Stuxnet, Duqu, Flame: What It Means For You

The cyberweapon genie is out of the bottle, and the U.S. is engaged in a cyberwar. Now it becomes clear why the Government has been trying to get private industry to agree to certain ...

Google to warn users of 'state-sponsored' hacking

The Guardian reported that Google will warn users of 'state-sponsored' hacking: "Search giant says it will alert Gmail users about targeted attacks, in move that could aid human rights ...

CHANGE YOUR LINKEDIN PASSWORD NOW

LinkedIn was hacked and 6.46 million encrypted passwords have been leaked on a Russian forum. This is not good, as the encrypted passwords are relatively easy to crack. If you are using ...

Make 30 Bucks In 30 Minutes!: Beta Test

[caption id="" align="alignleft" width="260" caption="30 Bucks In 30 Minutes"][/caption]We need immediate Beta Testers for our Internet Security Awareness Training! This is a THIS WEEKEND ...

CyberheistNews Vol 2, #24

CyberheistNews Vol 2, #23

CyberheistNews Vol 2, #22

Norton Protects Against Flame?

[caption id="" align="alignleft" width="260" caption="Norton Protects Against Flame?"][/caption] The antivirus industry is making hay with the new Flame malware, but Symantec marketing is ...

Chinese hacker brings grief to Calgary’s Catholic school system

Hackers will find any mail server that is not protected and/or configured correctly and use it to send out as much spam as possible. This gets the unsuspecting organization blacklisted ...

Ten years of Windows malware

Ed Bott wrote a truly excellent article over at ZDNet where he describes the history of Windows Malware, which shows on the very first slide that most malware is installed via social ...

Gmail Security Hole Allows Hackers To Automate Social Engineering Trick

Christopher Mims over at Technology Review was the first one to report on this. A large Gmail security hole could lead to mass harvesting of accounts, as hackers can automate this social ...

Russia's most effective cybercriminals

Rod Rasmussen over at SecurityWeek has a really interesting article about a Russian cyber gang driving a massive wave of fraud: "Tucked away in a small town outside Moscow, Russia one of ...

I am a malware coder and botnet operator

This is a discussion on Reddit, where a (presumably Polish) malware coder and botnet operator very candidly answers questions from people. This is a fascinating but rather technical read, ...

CyberheistNews Vol 2, #21


Get the latest insights, trends and security news. Subscribe to CyberheistNews.