Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Bogus Olympics 2012 Email Warning Blindside Users With Malware

The upcoming London Olympics is undoubtedly one of the most highly-anticipated sports event of the year. It is also a favorite social engineering ploy among cybercriminals. Just recently, ...

Scam Of The Week: 'The Evil Unsub'

An ordinary piece of spam slips through the filters, and you see a gorgeous sandy beach with palm trees. It's an enticing ad for a vacation to a tropical island, basically a big picture ...

Six Steps To Successful Security Awareness Training

Video: How a crimepack works

Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...

SMS-controlled Malware Hijacks Android Phones

Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...

Finally Defined: 'Advanced Persistent Threat'

[caption id="" align="alignleft" width="650" caption="Advanced Persistent Threat"][/caption]

Malicious Office documents target Mac OS X

Trendmicro reported: "We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the ...

Shield your business from cybercrooks

Anne Fisher, Editor of New York's Executive Inbox wrote: "Can you recognize a potentially disastrous breach of your computer system’s security when you see it? Let’s find out with two ...

Look Ma, malware without files!

Wow, instead of an exploit dropping a file onto the file system and running it... a DLL is injected straight into memory from the exploit, leaving nothing to scan on the harddrive. Writen ...

The Cridex malware trojan hides in fake LinkedIn invitations.

The Cridex malware trojan hides in fake LinkedIn invitations. Take care with those invites! GFI Labs recently discovered a LinkedIn email phishing scam that installs a banking trojan. It ...

Its Tax Scam Season

Warn everyone that 'Tax Scam Season' is upon us, and that no one should respond to anything tax-related via email. The IRS does not use email or social media, don't fall for refund offers ...

The Top 5 Executive Spear-phishing Scams

We recommend you copy and paste this section, and send it to your executive team, with a warning that they might be targeted with spear-phishing attacks. They need to 'Stop, Look, Think' ...

Internet Security is Becoming a Priority Business Issue

Phishing, the New Sport for Teenage Cybercriminals

Cybercrime: Getting Robbed Is Not What It Used To Be…

[caption id="attachment_1378" align="alignleft" width="200" caption="Old Fashioned Robber"][/caption] Way back in your grand-pappy’s day (before cybercrime), a bank-robber or garden ...

Two Hackers Give Up The Cybercrime Life

[caption id="attachment_1372" align="alignleft" width="260" caption="Chinese Hackers"][/caption] A pair of notorious Chinese hackers who left the dark side are now urging other hackers in ...

Beware the Spy-Eye Cybercrime Wave

[caption id="attachment_1367" align="alignleft" width="170" caption="cybercrime"][/caption] Cybercrime is a lucrative business which offers criminals very high returns in exchange for ...

White House Takes On the New “Cybercrime” Mob

[caption id="attachment_1362" align="alignleft" width="270" caption="White House - Cybercrime"][/caption] The White House has decided that it's time to take hacking seriously, asking for ...

Cybercrime Theft Topples $388 Billion Annually

[caption id="attachment_1357" align="alignleft" width="300" caption="Cybercrime Losses"][/caption] U.S. government agencies are getting better at sharing information about cybercrime with ...

Cybercrime: An Act of War

[caption id="attachment_1352" align="alignleft" width="300" caption="cyber act of war"][/caption] Efforts to chip away at the U.S. budget deficit are making life tougher for companies ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.