Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

[InfoGraphic] Ransomware Threats Concern Survey

We surveyed over 300 system administrators regarding ransomware, here are the results:

Fascinating Phishing Attack On Bitcoin Auction Bidders

Ever hear of CoinDesk? They are a news site about pricing and other info about digital currencies. They reported a fascinating phishing attack on a list of auction participants.

The Evolution of Mobile Ransomware

Security experts have warned for years that our smartphones are due for a major cyberattack. Like PCs back in the early days -- the 1990s -- mobile phones are largely unprotected by ...

Phishing Websites Up 10 percent First Quarter 2014

The United States continued to host the majority of phishing websites in the first quarter of 2014, but did not even crack the top 36 when it came to global computer infection rates, ...

Phishing Scam Of The Week: You Are Summoned To Court

The AppRiver team dsicovered an increase in phishing scams containing the Zortob Trojan. The new surge uses an existing successful scam, which warns the victim that they've been ordered ...

PLEASE WHITELIST OUR NEW EMAIL SERVERS

First week of July we will cut over to a new mailserver, which allows us to use different "hover-domains" (meaning a user sees something else than the domain we used as the default up to ...

New Cellphone Phishing Hack Pulls Data Out Of Computer Over Air

This is from a few weeks ago, and I only just got to it. Hackers can exfiltrate data via a cellphone and no longer need the Internet to invade and control a system, Ben Gurion University ...

New Ransomware Holds iPhones and iPads Hostage

Scam Of The Week: Mobile Apps As Phishing Lures

The bad guys use social engineering to make end-users click on links, and their scams rely mostly on exploiting trust. If they can make you believe a message is from a trusted source, ...

Phishing campaign uses VoIP to steal card data

An Eastern European Cyber Mafia has been found to run a multi-year campaign that targets small U.S. banks and credit unions with a sophisticated VoIP phishing scheme (aka vishing) to ...

Police Grapple With Cybercrime And Have Trouble Keeping Up

Danny Yadron at the WSJ got the picture right. State, and local law enforcement are struggling to keep up as their online case load grows. They are even gettting a hand from the FBI here ...

Scam Of The Week: Blended XP Phishing Security Threat

During the first quarter, I have been warning about the coming wave of Windows XP-related scams having to do with the April 8 End Of Life of XP. Here is what you can expect, and many ...

Scam Of The Week: Starbucks Gift From a Friend Phishing Emails

Love your tall latte? Better watch it, as a "friend" might send you an email with a fake Starbucks Coffee Gift offer. These emails read something like this in broken english. "Your friend ...

Phishing Attacks Work Best On Wednesday, Coming From IT

I had a look at the recent Mandiant M-Trends report. Interesting stuff. They observed that employees seem to fall for hacking tricks mostly on Wednesdays, and are most likely to click on ...

More Than Half Of End Users Did Not Get Security Awareness Training

This week I attended a webinar about Security Awareness Training hosted by David Monahan, Research Director Security and Risk Management of Enterprise Management Associates.

The 7 Steps Of The Cyber Kill Chain

Cyber security professionals are slowly but surely grabbing more and more military jargon. No surprises there, with a possible cyberwar brewing. The "kill chain" is a traditional warfare ...

ALERT - CryptoLocker Has A Competitor That Is Worse: CryptoDefense

As we said before, there is furious competition between cybergangs. Late February 2014 a copycat ransomware competitor to Cryptolocker was released which outdoes CryptoLocker. The malware ...

Attacks Give Lift to Cyber Insurance

Today in the Wall Street Journal, reporter Leslie Scism quoted Bloomberg News that "Target's data breach 'was the equivalent of 10 free Super Bowl ads."

Hackers hit Monster Jobs users with Gameover Zeus malware

Companies that are recruiting new employees are being targeted through Monster Jobs. The bad guys are using malware called Gameover Zeus, security firm F-secure reported in a blog post ...

Florida Blue takes security awareness training personally

Great post about security awareness by Douglas B. Robison, Florida Blue, a 2014 CSO40 award recipient. Here is an excerpt:


Get the latest insights, trends and security news. Subscribe to CyberheistNews.