Search Results for: phishing

phishing

phishing – Making Sense of Security

email phishing scams

5 Ways Businesses Can Avoid Phishing Scams Online

5 Ways Businesses Can Avoid Phishing Scams Online The concept of phishing is gaining immense popularity during the Covid-19 pandemic. People, by and large, are becoming victims of such fraudulent activities. Therefore, we have come up with 5 ways businesses can avoid getting trapped with emails that are meant to deteriorate their online identity. Based …

5 Ways Businesses Can Avoid Phishing Scams Online Read More »

Free Phishing-Protection Solution Amid The COVID-19 Outbreak

Free Phishing-Protection Solution Amid The COVID-19 Outbreak

 Free Phishing-Protection Solution Amid The COVID-19 Outbreak As the novel coronavirus (COVID-19) pandemic progresses across the world, cybercriminals are taking advantage of the situation resulting in a spike of phishing scams on remote workforce and corporate systems. While working from home helps the cause of social distancing, it introduces additional risks to the organization. With …

Free Phishing-Protection Solution Amid The COVID-19 Outbreak Read More »

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims

The use of impersonation in phishing attacks helps to establish credibility and a sense of ease. New data shows exactly how the bad guys are using this tactic to their advantage. We’ve covered impersonation scams before where cybercriminals pretend to be your CEO, hospital personnel, or even the government. New data from cybersecurity vendor Agari …

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims Read More »

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its …

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials Read More »

Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials 57% of phishing emails in 2020 were designed for stealing credentials, according to Cofense’s most recent Annual State of Phishing Report. Meanwhile, just 12% of phishing attacks last year were used for delivering malware. Cofense believes this is because credential phishing emails are better at bypassing email security filters …

Most Phishing Emails Are After Credentials Read More »

phishing today deepfakes tomorrow training employees to spot this emerging threat

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat

Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches — so start protecting your business now. Deepfake fraud is a new, potentially devastating issue for businesses. In fact, last year a top executive at an unidentified energy company …

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat Read More »

Scroll to Top