Human Risk Management Blog

Malware

Covering the latest malware threats affecting software, hardware, cloud networks, etc. Keeping you informed so you can keep your users safe.

Avoiding Dodgy Web Sites No Longer Works To Stay Safe

If in the past your way to stay safe on the Web was to not visit dodgy sites like gambling, porn, piracy or other "unsafe district" locations, that strategy no longer works. Google ...

Citadel 'Shutdown' Just A Microsoft PR Move

It was all over the news. The Citadel botnet responsible for stealing more than 500 million dollars out of bank accounts from both individuals and organizations worldwide has been largely ...

46 Percent Of Hospital’S Hacked Money Gone For Good

Chelan County Treasurer David Griffiths says Leavenworth's hospital district stands to recover less than half the $1 million stolen in an online banking theft. About $415,000 has been ...

Interesting Infection Danger Numbers

Symantec just released a white paper where they compared their product with 6 other enterprise endpoint security products. They had AV-Test do the review, and they included above graph to ...

Facebook 'Fraud-as-a-Service' Promoted Via Google

You may have read CyberheistNews Vol 3, #19, which had 'Fraud-as-a-service Goes Mainstream' as its headline. Here is a follow up on that. You can now download apps that hack Facebook, and ...

1st Quarter 2013: 6.5 Million New Malware Strains Built

The Research Team of Panda Labs just reported that between January and March of this year, more than 6.5 million new malware strains were built, and that of those 75% were trojans. In ...

Phishing Confusion Example

So, yesterday I received this email from my Identity Theft Provider. Been with them since 2008 so I know how their emails look. Normally I get the "all clear" signal once a month, but ...

Automated Twitter DM Spear Phishing

Automated Twitter DM Spear Phishing. It was to be expected. Cyber criminals now are able to scrape your followers from Twitter, and send you a Direct Message (DM) supposedly coming from ...

Which Antivirus Has The Best Phishing Protection? Surprise!

I ran across some very interesting research recently done by NSS Labs. They compared twelve of the most popular antivirus engines, they call them endpoint protection products (EPP) and ...

DHS disable your Plug And Play

Today, Jan 29 2013, the Department of Homeland Security advises computer users to disable Universal Plug and Play (UPnP), after researchers at Rapid7 alerted DHS that hackers could ...

Fake Apple Invoices

Internet criminals are getting more and more inventive with their social engineering attacks. Here are two examples of fake Apple invoices. The first is an example from the Sophos blog ...

Here Are Your 13 Predictions For 2013

Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...

Infographic The eternal life of malware

The San Mateo, California based security firm AlienVault created a very interesting infographic that they called “The eternal life of malware.” because the malware gets recycled and ...

91% of cyberattacks begin with spear phishing email

Antony Savvas at Computerworld UK had a good write-up about this quite interesting news: "Some 91% of cyberattacks begin with a "spear phishing" email, according to research from security ...

One phishing email exposes millions of people to data theft in South Carolina cyberattack

NBC News reported: COLUMBIA, S.C. -- A single malicious email sent to workers at the South Carolina Department of Revenue last August enabled an international hacker to crack into state ...

Researcher Warns 'Zombie Browsers' Are Skyrocketing

Ellen Messmer at Network World covered this one: "Some Web browsers can be tricked into using so-called "malicious extensions" that can give hackers the ability to hijack the user's ...

What Is The Top Phishing Day Of The Week? And Why?

[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...

Black Hole Malware Dominates Web So Train Your Employees

[caption id="" align="alignleft" width="460" caption="Microsoft Security Intelligence Report Volume 13"][/caption] Microsoft released their Security Intelligence Report (SIR) last week, ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.