Security Awareness Training Blog

Security Awareness Training Blog

Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.

Here Are Your 13 Predictions For 2013

Here Are Your 13 Predictions For 2013 - First Quantity, Now Quality: In 2013, cybercrime will focus more on quality than before. They will opt for increasingly smart malware, and more ...
Continue Reading

The Secret Of The Net One Big Buggy Beta

Most people look at me surprised when I tell them the internet is still in beta, but it's true,
Continue Reading

Malware called Eurograbber steals 36 million Euros

If cybercrime would be promoting their malware, for sure they would call their EuroGrabber 'next-generation' Zeus crimeware. This is (a lot) more than your run-of-the-mill banking Trojan. ...
Continue Reading

Guy Gets SWAT Team-ed for Not Securing His Wireless Network

Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need ...
Continue Reading

Mass phishing emails a thing of the past?

The net-security website reported: "PhishMe predicts that phishers will be changing their tactics in 2013 – resorting to targeted spear phishing emails rather than the mass mails of the ...
Continue Reading

91% of cyberattacks begin with spear phishing email

Antony Savvas at Computerworld UK had a good write-up about this quite interesting news: "Some 91% of cyberattacks begin with a "spear phishing" email, according to research from security ...
Continue Reading

$345,000 Cyberheist Settles After Three Years Dispute

Patco Consulting was one of the first companies to seek protection via the courts after more than half a million dollars was stolen out of their bank via an account takeover by eastern ...
Continue Reading

One phishing email exposes millions of people to data theft in South Carolina cyberattack

NBC News reported: COLUMBIA, S.C. -- A single malicious email sent to workers at the South Carolina Department of Revenue last August enabled an international hacker to crack into state ...
Continue Reading

VCs Validate Security Awareness Training

I am very encouraged to see our friends at PhishMe getting 2.5 Million in Venture money to expand their business. With this new investment, Christopher Steed, Vice President at Paladin ...
Continue Reading

How a Coca-Cola Exec Fell for a Hacker's E-mail Trick

In the annals of what-was-I-thinking moments in computer security, this has to be one of the most gobsmacking. According to a Bloomberg News investigation of a series of undisclosed ...
Continue Reading

7 shortcuts To Get Your Network Hacked Final Results

[caption id="" align="aligncenter" width="700"] Shortcuts To Get Hacked[/caption] October 30, 2012 we asked system administators: "In your opinion, what are the most gruesome errors a ...
Continue Reading

Cyberheists A Helluva Wake-up Call to Small Biz

Brian Krebs has an excellent example of a recent cyberheist. Read it and weep! The $180,000 robbery took the building security and maintenance system installer Primary Systems Inc. by ...
Continue Reading

Top 5 Spear-Phishing Attacks Targeting Executives

Twice a year, KnowBe4 publishes the Top 5 spear-phishing attacks that are used to lure executives into clicking on links or open infected attachments. We recommend sending this list to ...
Continue Reading

The TOP 10 BYOD Gotchas

Did you know? On any given day across the globe, the number of iPhones sold will exceed the number of babies born (378,000 to 371,000) The problem is that mobile device security has not ...
Continue Reading

2013 Security Awareness Training Survey

I just recevied some interesting information. SearchSecurity.com surveyed IT professionals about their end-user security training purchase intentions for 2013. The numbers are revealing. ...
Continue Reading

Why We Are Doing This

Some of you might remember Sunbelt Software, which from 1996 to 2010 sold system admin and security tools for Windows Server. I am one of the two co-founders of Sunbelt. After ...
Continue Reading

Industrial Control Systems The Next Twin Towers

[caption id="" align="aligncenter" width="588"] Shodan Network[/caption] Eugene Kaspersky a few days ago wrote a hair-raising blog post about the reality of our Industrial Control Systems ...
Continue Reading

What Is The Top Phishing Day Of The Week? And Why?

[caption id="" align="alignleft" width="280" caption="Top Phishing Day"][/caption] Websense reported on October 8, 2012 about their July-August 2012 research. They said: "A disturbing new ...
Continue Reading

Real-time Cyber-Attack Map

[caption id="" align="aligncenter" width="625" caption="Real-time Cyber-Attack Map"][/caption] James Fallows reported on his latest blog about the new real-time map of the honeynet ...
Continue Reading

What a live botnet looks like YIKES

[caption id="" align="aligncenter" width="760" caption="ZeroAccess Botnet"][/caption] MIT's Technology Review posted something fasctinating put together by Mike Orcutt. What you see above ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews