Phishing

Top 15 Tips To Prevent Robocalls-Making Sense of Security

How To Stop Those Annoying Robocalls

Top 15 Tips To Prevent Robocalls We are being invaded by robocalls! These automated phone calls can be annoying and unwanted, but they usually deliver a recorded message. With the recent rise in IVR ( interactive voice response ) software tools, many businesses are using these types of automated calls as a marketing strategy. The …

How To Stop Those Annoying Robocalls Read More »

Tinder to get panic button, catfish-fighting facial recognition

Tinder to Get Panic Button and Catfish-Fighting Facial Recognition

Tinder to Get Panic Button and Catfish-Fighting Facial Recognition In an effort to keep users safe – and when it comes to Tinder or other dating apps, that means keeping them from being raped, murdered or even, in one horrific case, dismembered. Tinder is incorporating a panic button into the app, as well as Artificial …

Tinder to Get Panic Button and Catfish-Fighting Facial Recognition Read More »

email phishing scams

5 Ways Businesses Can Avoid Phishing Scams Online

5 Ways Businesses Can Avoid Phishing Scams Online The concept of phishing is gaining immense popularity during the Covid-19 pandemic. People, by and large, are becoming victims of such fraudulent activities. Therefore, we have come up with 5 ways businesses can avoid getting trapped with emails that are meant to deteriorate their online identity. Based …

5 Ways Businesses Can Avoid Phishing Scams Online Read More »

phishbait-surveys-rule-changes-boss

A Can of Phish Bait: from Surveys to Rule Changes to Your Boss’s Boss

Employees need to continue being wary of phishing scams as they begin to return to the office, according to Roger Kay at INKY. Kay describes several phishing templates that INKY has intercepted in recent months, including one that informed recipients that they needed to fill out a compliance form related to COVID-19 risks. “Reasonably well …

A Can of Phish Bait: from Surveys to Rule Changes to Your Boss’s Boss Read More »

Spoofing Tailored to Financial Departments

Spoofing Tailored to Financial Departments

Researchers at Area 1 Security have warned of a large spear phishing campaign targeting financial departments and C-suite employees with spoofed Microsoft 365 login pages. The researchers say that in some cases the attackers “specifically targeted newly-selected CEOs during critical transitionary periods.” Additionally, the attackers went after executives’ assistants. “Beyond financial departments, the attackers also …

Spoofing Tailored to Financial Departments Read More »

Billions of Spoofed Emails

Why Should You Be Using DMARC? 3 Billion Spoofed Emails are Being Sent Everyday

In a recent report from TechRadar, email is still the most popular form of malware distribution. Billions of emails that are spoofed are being sent everyday. Even though email is still the oldest form of online communication, it is still the go-to platform for cybercriminals to attempt to infiltrate. According to the report by Vailmail, …

Why Should You Be Using DMARC? 3 Billion Spoofed Emails are Being Sent Everyday Read More »

Cyber Insurance is might not Cover that $6 Million in Cyber Fraud

Think Your Cyber Insurance is Going to Cover that $6 Million attack in Cyber Fraud? Think Again.

The latest tale of an organization falling victim to a business email compromise cyber attack on their credit card processor highlights how very specific the scenario needs to be to see a payout. In 2018, RealPage, a Texas-based service provider for property owners and property management companies was the victim of a cyber attack that …

Think Your Cyber Insurance is Going to Cover that $6 Million attack in Cyber Fraud? Think Again. Read More »

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims

The use of impersonation in phishing attacks helps to establish credibility and a sense of ease. New data shows exactly how the bad guys are using this tactic to their advantage. We’ve covered impersonation scams before where cybercriminals pretend to be your CEO, hospital personnel, or even the government. New data from cybersecurity vendor Agari …

Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims Read More »

iStock 1205460056252028129

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem

While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to …

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem Read More »

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its …

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials Read More »

Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials 57% of phishing emails in 2020 were designed for stealing credentials, according to Cofense’s most recent Annual State of Phishing Report. Meanwhile, just 12% of phishing attacks last year were used for delivering malware. Cofense believes this is because credential phishing emails are better at bypassing email security filters …

Most Phishing Emails Are After Credentials Read More »

security admin checklist

Security admins checklist: 10 tasks to perform every year

Here is a checklist of 10 important tasks security administrators should perform to keep devices protected and secure. Security administrators oversee the secured processes in place, safeguarding the day-to-day operations of an organization. While it is easy for users to focus solely on protecting computers and their devices, security admins are tasked with managing the overall …

Security admins checklist: 10 tasks to perform every year Read More »

Scroll to Top