Human Risk Management Blog

Hacking

Hacking news about techniques cyberriminals use, how they (sometimes) get caught, the organizations that have been hacked and how it impacts their business.

Malware Only Lives For A Few Hours

Rob Rachwald and Zheng Bu at FireEye came up with some interesting observations: "At FireEye, we look at hundreds of malware samples daily, and, in a recent talk at RSA Conference, Zheng ...

Shocker Symantec Admits That Antivirus Is Dead

An article in the Wall Street Journal of May 5, 2014 summarized what I have been talking about these last few years. 25 years ago, Symantec was one of the first IT security companies to ...

Verizon's New 2014 Data Breach Report: Summary

In IT, we are subject to help desk tickets and putting out fires. The problem with this is that most of these are short-term fixes. It is usually about last week's downtime, today's ...

14 Things That Definitely Should Not Be On The Internet, But Are

You would think that after the recent few years of press showing the risks of the Internet that people would wise up. But no. To my astonishment it's getting worse, not better. Just have ...

Hackers Used Spear Phishing Attack To Hack CNN Blogs

Security analysts at Intelligence firm InterCrawler published the details of the investigation on recent attack against CNN Blogs and social media accounts. Recently a few social media ...

Which HackBusters Logo Do You Like Best?

You miss important IT security news because you aren’t subscribed to the right sources, or the relevant security news is snowed under simply because of the incredible volume. So KnowBe4 ...

Dont Let Your C-Level Execs Wind Up At Capitol Hill Like This

Major U.S. retailers at Senate hearing: hackers have upper hand

Yahoo Email Hacked

Yahoo warned yesterday that unknown attackers have attempted to access a number of Yahoo Mail accounts, and urged users to change their passwords even if they haven't been affected. Jay ...

The History Of Hacking In 5 Minutes For Dummies

What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a ...

Even the tech-savvy get their accounts hacked...

By Steve Ragan , Staff Writer at CSO wrote: "October 22, 2013 — The millennial generation, those of us who were born and raised alongside the Internet, should be wise enough to avoid ...

New Cybercrime-as-a-Service: Unethical Pen-testing

I have talked about this a few times before, there is a well-developed $3 Billion underground economy specialized in cybercrime. Here is an example of a "promising" new criminal DIY ...

Spear-phishing attackers vandalize CNN, TIME and Wash Post

You would think that by now journalists and people in media and advertising would be on the alert for social engineering red flags. But no. Syrian hacktivists sent a spear-phishing attack ...

LLoyds: Cyber Risk Rises from 12th to 3rd place In Three Years

You all know the world famous insurance company LLoyds. What you may not know is that they maintain a list of Top Risks. It's called their Risk Index and it's the result of a survey of ...

Cybercrime Attack Vector Of Choice: Employees

Today, employees are the low hanging fruit for cybercrime. Organizations counter this with what is called 'Security Awareness Training' (SAT), but modern SAT is far removed from how it ...

CyberheistNews Vol 3 #20

Latest Attack Trend: 'Persistent Spear Phishing'

CyberheistNews Vol 3, # 19

CyberheistNews Vol 3, # 19 Fraud-as-a-service Goes Mainstream

Knowbe4 - CyberheistNews Vol 3, #14


Get the latest insights, trends and security news. Subscribe to CyberheistNews.