Human Risk Management Blog

Security Awareness Training

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

SEA used spear-phishing in attack on NY Times

A spear-phishing attack, one of the most common and oldest cyber tricks in the book, enabled hackers to hijack and modify the DNS records for several domains on Tuesday, including The New ...

Cybercrime Automates Fake ID's For Spear-phishing

Today it was reported through several sources that a new Cybercrime-as-a-Service option is available: creation of fake scanned passports, ID cards, driver's licenses and fake scanned ...

IT Security Is Broken Bad

With the TV show Breaking Bad in its last season, this seems to be a fun title. However, the topic is not all that much fun. You should realize it's not a question of when you will be ...

Are Your Email Addresses On A Russian Phishing Site?

We are finding many U.S. commercial email addresses at the Russianemailsworld.boommer.ru website. It is really a 'staging' area for emails to be posted by the criminal underground. They ...

Spear-phishing attackers vandalize CNN, TIME and Wash Post

You would think that by now journalists and people in media and advertising would be on the alert for social engineering red flags. But no. Syrian hacktivists sent a spear-phishing attack ...

Hackers put a bull's-eye on small business

Less than 500 employees? You’ve got a 20 percent chance of being hacked, and if it happens there’s a good chance your business is finished.

We started trusting bad code from Day One

Vint Cerf – Photo by Charles Haynes

Scam Of The Week: "Held For Ransom"

You should alert your users that a particularly effective scam is growing by leaps and bounds recently. It's not new, but it's bursting into mainline cybercrime these last few weeks. The ...

Watching Porn on a Mobile …Risky?

The Internet has its own Red Light District, and it is one of the most unsafe areas you can browse. Online porn is a profitable sideline for the adult industry, but a mainline business ...

U.S. Commercial Banking In Top 10 Riskiest Industries.

Mark Holan at the Tampa Bay Business Journal reported on something remarkable. Commercial Banks are in the #6 slot of the Top 10 Riskiest industries in the U.S. (!) "Industry research ...

Scam Of The Week: Christian Singles

Employees the Weakest Link of Cyber Security, Report Finds

Antivirus company Bitdefender reported something important. Here is their blog post of July 17, 2003.

Congressional Aides Targeted By Spear-phishing Attacks

Reuters just reported that Congressional aides in the Senate and House of Representatives said on Thursday that they were notified of a potential security risk involving email and other ...

My New Pebble Smartwatch: A Social Engineering Problem

Why help desk employees are a social engineer's favorite target

Steve Rangan over at the The CSO site wrote:

Phishing Attack: Your Twitter friend may not really be your friend

There is a new phishing campaign doing the rounds trying to get your Twitter login credentials. The scam arrives as a direct messages to prospective victims from one of their contacts. ...

7 reasons for security awareness failure

Ira Winkler and Samantha Manke just wrote a great article at the CSO site about why security awareness programs fail. They started out with: "There is a great dichotomy in Security ...

CTO of media company faked-out employees with "phishing" emails

There is a fascinating article in SC Magazine dated July 3, 2013 which tells the story of Atlantic Media Chief Technology Officer Tom Cochran, who blasted out a simulated phishing email ...

Five Ways Your Employees Can Kill Your Company

One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...

The Inevitability Of "The Click"

From the 2013 Verizon Data Breach Investigations Report. Note that i t only takes 20 emails to get one successful click on a phishing attack. Read the story above!


Get the latest insights, trends and security news. Subscribe to CyberheistNews.