Security Awareness Training Blog

Social Engineering Blog

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

We started trusting bad code from Day One

Vint Cerf – Photo by Charles Haynes
Continue Reading

Scam Of The Week: "Held For Ransom"

You should alert your users that a particularly effective scam is growing by leaps and bounds recently. It's not new, but it's bursting into mainline cybercrime these last few weeks. The ...
Continue Reading

Watching Porn on a Mobile …Risky?

The Internet has its own Red Light District, and it is one of the most unsafe areas you can browse. Online porn is a profitable sideline for the adult industry, but a mainline business ...
Continue Reading

Scam Of The Week: Christian Singles

Continue Reading

Employees the Weakest Link of Cyber Security, Report Finds

Antivirus company Bitdefender reported something important. Here is their blog post of July 17, 2003.
Continue Reading

Congressional Aides Targeted By Spear-phishing Attacks

Reuters just reported that Congressional aides in the Senate and House of Representatives said on Thursday that they were notified of a potential security risk involving email and other ...
Continue Reading

Why help desk employees are a social engineer's favorite target

Steve Rangan over at the The CSO site wrote:
Continue Reading

Phishing Attack: Your Twitter friend may not really be your friend

There is a new phishing campaign doing the rounds trying to get your Twitter login credentials. The scam arrives as a direct messages to prospective victims from one of their contacts. ...
Continue Reading

7 reasons for security awareness failure

Ira Winkler and Samantha Manke just wrote a great article at the CSO site about why security awareness programs fail. They started out with: "There is a great dichotomy in Security ...
Continue Reading

CTO of media company faked-out employees with "phishing" emails

There is a fascinating article in SC Magazine dated July 3, 2013 which tells the story of Atlantic Media Chief Technology Officer Tom Cochran, who blasted out a simulated phishing email ...
Continue Reading

Five Ways Your Employees Can Kill Your Company

One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...
Continue Reading

The Inevitability Of "The Click"

From the 2013 Verizon Data Breach Investigations Report. Note that i t only takes 20 emails to get one successful click on a phishing attack. Read the story above!
Continue Reading

FBI Warns of Spear-Phishing Attacks

Spear-phishing attacks are up, and they are targeting individuals across all industries, according to a new warning issued by the U.S. Federal Bureau of Investigation .
Continue Reading

How Zombie Phones Could Create a Gigantic, Mobile Botnet

Seen "World War Z" recently? Your mobile phone might soon be infected and become a zombie.
Continue Reading

Why Business Is Losing The War Against Cybercrime

Price Waterhouse (PwC) and CSO Magazine just released their 2013 State of Cybercrime Survey. It shows that lack of risk awareness means companies are poorly defended. This is their 11th ...
Continue Reading

Snowden Exfiltrated NSA Files On Thumb Drive

It appears that Edward Snowden used a thumb drive to exfiltrate the Top Secret files documents from NSA's network. The US DoD banned the use of flash drives in 2008 after Defense systems ...
Continue Reading

Scam Of The Week: CIA Prism Watchlist

Scam Of The Week: CIA Prism Watchlist Just this morning, a researcher discovered an email uploaded to Virustotal called CIA's_prism_Watchlist_.eml. The content refers to Snowden, and the ...
Continue Reading

SlideShare Puts Us On Front Page!

The super popular SlideShare site has featured our Seven Social Engineering Vices slide deck on their front page for a short time. Here is what they sent me!
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews