Security Awareness Training Blog

IT Security Blog

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

Fake Apple Invoices

Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...
Continue Reading

Upper Management Often Ignores IT Security Policy

Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company called Cryptzone who interviewed 300 IT Security ...
Continue Reading

Facebook Graph Search Is Social Engineering Bonanza

Zuck has come out with something new, and you always need to watch it when that happens. It's a combination of big data and social networking so that people can easily find new friends, ...
Continue Reading

Healthcare Security Awareness Training

KnowBe4 and it's CEO Stu Sjouwerman (pronounced shower-man) were featured in For The Record Magazine, a leading publication for Healthcare. The article was about the risks of Bring Your ...
Continue Reading

Deloitte Study shows 88 percent thinks they are cyber threat safe

Oh my. Deloite UK did a bunch of interviews with small and medium organizations which showed that a whopping 88% think they are safe and will not be attacked from the outside. Talk about ...
Continue Reading

Thanks For Your Support We Grew 470 percent from 2011 to 2012

[caption id="Stu Sjouwerman" align="alignleft" width="390"]Stu Sjouwerman, Founder and CEO of KnowBe4,LLC [/caption] Thanks for your support! KnowBe4's 2011 to 2012 year-over-year growth ...
Continue Reading

Here Are Your 13 Predictions For 2013

Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...
Continue Reading

Infographic The eternal life of malware

The San Mateo, California based security firm AlienVault created a very interesting infographic that they called “The eternal life of malware.” because the malware gets recycled and ...
Continue Reading

How to Find if a Website Is Legitimate

1) Call, write, or email the website using the contact information provided on their website to check for legitimacy. If you reach an automated voice messaging system, find that the ...
Continue Reading

The Secret Of The Net One Big Buggy Beta

Most people look at me surprised when I tell them the internet is still in beta, but it's true,  
Continue Reading

Malware called Eurograbber steals 36 million Euros

If cybercrime would be promoting their malware, for sure they would call their EuroGrabber 'next-generation' Zeus crimeware. This is (a lot) more than your run-of-the-mill banking Trojan. ...
Continue Reading

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
Continue Reading

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...
Continue Reading

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/
Continue Reading

FBI has new Cyber Safety Website

10/15/12 - the FBI announced a new initiative: "With school back in session, one topic that’s on many class curriculums around the nation is cyber safety. After all, it’s a ...
Continue Reading

Hackers exploit Skype API to infect Windows PCs

Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...
Continue Reading

Defending Against Phishing Attacks

By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...
Continue Reading

Scam Of The Week You Have Been Targeted For Assasination

The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...
Continue Reading

Ex-Sunbelter Joins ex-Hacker Mitnick in Anti-Hacker Training

Doug Barney, Editor in Chief of Redmond Magazine did a write-up about our new Kevin Mitnick Security Awareness Training, which was pretty fun. You can read his blog post here
Continue Reading

I was quoted on CNNMoney re mobile security

[caption id="" align="alignleft" width="230" caption="Mobile Security"][/caption] NEW YORK (CNNMoney) -- Security experts have warned for years that our smartphones are due for a major ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews