Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

OMG - I did not know it was THIS horrible.

More from Brian Krebs's astounding blog post today. "As the chart I compiled above indicates, attackers are switching the lure or spoofed brand quite often, but popular choices include ...

F-Secure Cautions about Fresh Olympic-themed Spam

F-Secure the security company based in Finland has recently cautioned that spam mails themed on the Olympics are targeting Internauts while carrying web-links to one malevolent PDF file ...

Fake LinkedIn Emails To Reset Your Password

Since LinkedIn had their IPO, they have been in the news a lot more, even if only to compare them with the recent Facebook IPO Debacle. But the better known you are, the bigger target you ...

Malicious PowerPoint File Contains Exploit, Drops Backdoor

TrendLabs discovered a malicious MS PowerPoint document that arrives attached to email messages. The file contains an embedded Flash file, which exploits a software bug found in specific ...

VIDEO The Top 5 Online Security Traps And How To Avoid Them

GFI is one of the few antivirus vendors that understands the importance of prevention and end-user training. They produced this useful video that in two minutes illustrates the top 5 ...

Gmail Security Hole Allows Hackers To Automate Social Engineering Trick

Christopher Mims over at Technology Review was the first one to report on this. A large Gmail security hole could lead to mass harvesting of accounts, as hackers can automate this social ...

How to Start an IT Security Awareness Program

Mike Chapple is an IT professional and assistant professor of computer applications at the University of Notre Dame. He wrote at biztechmagazine:"Are your users aware of their ...

$20 Million Stolen in Cyberheists from SMEs, Money Sent to China

The FBI reported this week that between March 2010 and April 2011, cyberthieves drained approximately $20 million from the accounts of US-based small to medium enterprises (SMEs) via ...

77 Million Network Accounts for Sony PlayStation Compromised by Daring Cybercrime

This morning the news is ablaze with reports of a hack into Sony's PlayStation Network, with numerous media outlets proclaiming that as many as 77 million customer accounts have been ...

Do Your PCs Come With "For Rent" Signs for Cyberthieves?

Brian Krebs is a former reporter on the information security beat for The Washington Post who now runs his own Website KrebsOnSecurity.com in Northern Virginia. IN a recent (4/8/2011) ...

Three Quarters of All SMB Banking Cybercrime Happens Online

A recent study entitled "The 2011 Business Banking Trust Study" reports that three of every four small and midsized businesses that experienced banking fraud in the previous year incurred ...

Cybercrime: Ventura County, CA Credit Card Tax Payment System Hacked

Ventura County, California, is a small small county (population: 802,983 according to 2009 numbers from the US Census Bureau) north of the greater Los Angeles area. According to a March ...

Rustock Botnet Cybercrime Takedown, Thanks to MS-Led Multi-Party Effort

The infamous Rustock botnet, estimated by some parties to be responsible for between 30 and 50 percent of all the spam in the world—up to 30 BILLION items per day—has been taken down. ...

Symantec's Latest 'State of Spam & Phishing' Report

Report #51 from Symantec, the "State of Spam & Phishing" for March 2011 is out. From the phishing side, the news is grim but not unexpected. Phishing is up 38.56% for the month, ...

Cyberheist: The Real Bite in Company Suits Against Banks for Negligence

As we've mentioned repeatedly in this blog, the FDIC does not insure SMBs against losses to fraudulent account access the same way that it covers individual bank accounts. This has left ...

Beware Cross-Channel Cybercrime Threats!

Shoot! Anybody with a smidgen of Web security history under his or her belt winces as soon as the word "cross" comes up as a modifier, thanks to the legions of exploits based on ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.