Human Risk Management Blog

Social Engineering

Latest social engineering news, analysis, tactics the bad guys are using and what you can do to defend your organization.

Great Video Illustrates Need For Security Awareness Training

Snowden Exfiltrated NSA Files On Thumb Drive

It appears that Edward Snowden used a thumb drive to exfiltrate the Top Secret files documents from NSA's network. The US DoD banned the use of flash drives in 2008 after Defense systems ...

Scam Of The Week: CIA Prism Watchlist

Scam Of The Week: CIA Prism Watchlist Just this morning, a researcher discovered an email uploaded to Virustotal called CIA's_prism_Watchlist_.eml. The content refers to Snowden, and the ...

SlideShare Puts Us On Front Page!

The super popular SlideShare site has featured our Seven Social Engineering Vices slide deck on their front page for a short time. Here is what they sent me!

The Three Types Of Cyberattacks

Eugene Kaspersky recently gave one of his very rare interviews. He was in Israel for a staff recruitment tour, and was quoted saying:"

New on SlideShare: The Seven Deadly Social Engineering Vices

The Seven Deadly Social Engineering Vices blog post has been viewed well over 11,000 times and has gone viral. That's why we created a (much prettier) SlideShare version for you which you ...

Data Breach Costs: 10 Ways You're Making It Worse

Inadequate response plans and poorly executed procedures caused data breach costs to rise significantly at some businesses, according to the Ponemon Institute. Mistakes, negligence and ...

Citadel 'Shutdown' Just A Microsoft PR Move

Did China Leak Prism Deliberately?

UPDATED June 9: 16:51p - In an interview with TechCrunch, Eugene H. Spafford, a computer science professor at Purdue and a noted expert in computer security observed something ...

How the Syrian Electronic Army Hacked The Onion

This is a write-up of how the Syrian Electronic Army hacked The Onion using spear-phising. In summary, they phished Onion employees’ Google Apps accounts via 3 separate methods. From ...

Cybercrime Targets: C-Level execs, HR managers and System Admins

According to a recent research of Group-IB on cybercrime, senior management is considered among most popular targets.

The Seven Deadly Social Engineering Vices

(updated June 17, 2015) You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have ...

Webroot Spots NATO Job Apps Lead To Malware

This one qualifies as a Scam Of The Week and it's a good one to forward to your employees.

0-Day Threats and Security Awareness

OK, we all know that there is a lively trade in 0-day threats. Often this is an unknown vulnerability in a popular browser that is not fixed yet. Microsoft recently announced they fixed ...

Phishing Scam Of The Week: Walmart.com

Wal-Mart took special effort this week and warned customers of an unusually 'high quality' phishing email that tries to get personal and credit information. They stated on their corporate ...

Facebook 'Fraud-as-a-Service' Promoted Via Google

You may have read CyberheistNews Vol 3, #19, which had 'Fraud-as-a-service Goes Mainstream' as its headline. Here is a follow up on that. You can now download apps that hack Facebook, and ...

Twitter Warning: "We Believe That These Attacks Will Continue"

Consumer Reports: 9.2 Million Phishing Victims Last Year

Consumer Reports today came out with some numbers that should give you pause. 9.2 Million Americans fell victim to a phishing attack last year, and a whopping 58.2 Million had a malware ...

Why We Need Security Awareness Training Programs

$1Million Cyberheist From Leavenworth Hospital

Kevin Mitnick sent me an article that illustrates why it is needed to train all employees not to fall for hacker tricks: "Friday, April 26, 2013 - WENATCHEE — Hackers stole more than $1 ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.