Security Awareness Training Blog

IT Security Blog

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

How to Find if a Website Is Legitimate

1) Call, write, or email the website using the contact information provided on their website to check for legitimacy. If you reach an automated voice messaging system, find that the ...
Continue Reading

The Secret Of The Net One Big Buggy Beta

Most people look at me surprised when I tell them the internet is still in beta, but it's true,  
Continue Reading

Malware called Eurograbber steals 36 million Euros

[caption id="Cybergeddon" align="aligncenter" width="690"]Eurograbber malware illustration courtesy Check Point Software Technologies Ltd.[/caption] If cybercrime would be promoting their ...
Continue Reading

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
Continue Reading

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...
Continue Reading

Article: Is Your Credit Card Stolen? Check for free!

Is Your Credit Card Stolen? Check for free! (This is a great PSA) http://ismycreditcardstolen.com/
Continue Reading

FBI has new Cyber Safety Website

10/15/12 - the FBI announced a new initiative: "With school back in session, one topic that’s on many class curriculums around the nation is cyber safety. After all, it’s a ...
Continue Reading

Hackers exploit Skype API to infect Windows PCs

Cyber criminals are again using Skype to wreak havoc, according to Sophos's Naked Security blog. The worm they're using this time, a variant of Dorkbot, lets hackers take control of ...
Continue Reading

Defending Against Phishing Attacks

By now, we all know that the bad guys are using phishing and spear-phishing to go after your users and penetrate your networks. This type of social engineering attack is getting used more ...
Continue Reading

Scam Of The Week You Have Been Targeted For Assasination

The last few weeks, the Internet Crime Complaint Center (IC3) reported they received complaints about the latest version of 'Hit Man scam' which now tells people via e-mail they have been ...
Continue Reading

Ex-Sunbelter Joins ex-Hacker Mitnick in Anti-Hacker Training

Doug Barney, Editor in Chief of Redmond Magazine did a write-up about our new Kevin Mitnick Security Awareness Training, which was pretty fun. You can read his blog post here
Continue Reading

I was quoted on CNNMoney re mobile security

[caption id="" align="alignleft" width="230" caption="Mobile Security"][/caption] NEW YORK (CNNMoney) -- Security experts have warned for years that our smartphones are due for a major ...
Continue Reading

1-Minute-Internet-Security-Survey

Could you do us a big favor? Spend one minute! We asked people which things they thought were important for Internet Security at the house. In other words, what they thought was needed to ...
Continue Reading

5 BYOD Deployment Rules

(1) To start off with, have a BYOD project leader that has the authority to enforce the required policies, procedures, and training to get BYOD implemented securely.
Continue Reading

KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay

KnowBe4 CEO TV Interview on being an Entrepreneur in Tampa Bay I was interviewed as a panel member at the Front Row Tampa Bay event during the 2012 RNC in Tampa, FL about the benefits of ...
Continue Reading

IT's 9 Biggest Security Threats

[caption id="" align="aligncenter" width="250" caption="9 Biggest Security Threats"][/caption] By now you probably know I am a fan of Roger Grimes. He's a highly skillled security veteran ...
Continue Reading

What is wrong with this picture?

[caption id="" align="aligncenter" width="500" caption="What is wrong with this picture?"][/caption] This picture is a screen shot from the Polish TV Channel TVP. See something that ...
Continue Reading

Top hacker details how to avoid cybercrime

[caption id="" align="alignleft" width="300" caption="(Flickr user Alan Cleaver)"][/caption] (MoneyWatch) With the National Republican Convention fast approaching at the end of August, ...
Continue Reading

Apple social engineered - Allows access to iCloud

[caption id="" align="alignleft" width="300" caption="Apple Tech Social Engineered"][/caption] [UPDATED August 7] Former Gizmodo reporter Mat Honan was hacked hard. He found out that an ...
Continue Reading

More Than Half Of Top 20 Fortune 500 Firms Infected With Gameover Zeus Botnet

The Gameover Zeus botnet is now the biggest financial fraud botnet around, and it's run by a single cybercrime group out of Eastern Europe, according to new research. Brett Stone-Gross, ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews