Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Target Breach: Where The Weak Points Were

Dave Kearns posted March 18 that he's been fascinated by the information that keeps coming out of the Taget Stores data breach. He's got a great analysis, and he ends off with words that ...
Continue Reading

Phishing FaceBook: Malaysia Plane MH370 Has Been Spotted

Hackers jump on every opportunity they can to trick people. This time they hijacked to story about the missing Malaysian Airlines plane.
Continue Reading

Scam Of The Week: "You may have cancer" phishing email

Amy Stevens of the PR group Davies Murphy became part of the story when Eduard Kovacs at SoftPedia picked up on her tweet about a phishing email she just received. If you recently had a ...
Continue Reading

When A Stranger Calls

Dr. Neal Krawetz posted something very useful over at the hackerfactor. Apart from that it's also very entertaining. He is legally recording various cold-calls he gets. Some of them are ...
Continue Reading

Sophisticated Scam Of The Week: Cell Phone Voucher

There's a fresh, well thought-out social engineering scam sticking up its ugly head right now. The bad guys are promising cell phone users amounts of up to $100 in vouchers using a ...
Continue Reading

Inevitable: Phishing That Pretends To Be Salesforce.com

Just a heads-up, screen shot above. The lifehacker site in Australia warned about a phishing scam using a "salesforce" email as bait. The bad guys will use anything to get you to click, ...
Continue Reading

How to Test the Phishing Savvy of Your Staff

Continue Reading

Average Enterprise Is Hit by a Cyber Attack Every 1.5 Seconds

FireEye released its yearly Advanced Threat Report, and they did some interesting math. Enterprises are hit by cyber attacks on average once every 1.5 seconds, which is double from the ...
Continue Reading

41 Percent Of Infected Pay The Cryptolocker Ransom

I have warned about the Cryptolocker ransomware before, but now we have some hard numbers about the percentage of people that are forced to pay up when a workstation or server has been ...
Continue Reading

Kiss Your Old Security Awareness Training Program Goodbye!

Is Your Security Awareness Training Program Not Working? Are Users Still Clicking Phishing Links And Opening Infected Attachments?
Continue Reading

This Week Top 10 Phishing Scams

It's my job to keep an eye out for the most recent phishing scams and let everyone know. One of the newsletters I get as a source for this is called "hoaxslayer". They just reported some ...
Continue Reading

Fake LinkedIn Phishing Profiles Going Pro

Continue Reading

Why Cybercrime Pays Off

Continue Reading

ransomware phishing warning issued by European Cybercrime Centre

Looks like the bad guys are also targeting Europe with ransomware phishing scams.
Continue Reading

CyberheistNews Vol 4, # 05

CyberheistNews Vol 4, # 05
Continue Reading

Social Engineering Alert: Missed Call From A Mystery Number?

TechCrunch wrote: "The people who read our site are a pretty savvy lot. You know not to accept checks from distant princes. You can spot a phisher from a mile away. But here’s one that ...
Continue Reading

Scam Of The Week: Funeral Notification Phishing Attack

Another one to warn your employees about. The bad guys do not hesitate to exploit the most basic fears of people; the sudden death of a loved one. The message claims to be from a funeral ...
Continue Reading

Arg The Cat O Nine Tails For Careless Clickers

Arg! The Cat O' Nine Tails For Careless Clickers!
Continue Reading

SHOCKER: Point-Of-Failure Phishing Training Does Not Work

The Govinfosecurity site just reported on some very interesting scientific research that finds so-called "embedded training" is ineffective. Let's quickly define "embedded", they chose ...
Continue Reading

The History Of Hacking In 5 Minutes For Dummies

What do you do when you need to explain the history of hacking to a busy non-technical manager in five minutes or less? Here is an attempt to make this extremely complex subject into a ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews