Top 15 Tips To Prevent Robocalls We are being invaded by robocalls! These automated phone calls can be annoying and unwanted, but they usually deliver a recorded message. With the recent rise in IVR ( interactive voice response ) software tools, many businesses are using these types of automated calls as a marketing strategy. The
Tinder to Get Panic Button and Catfish-Fighting Facial Recognition
Tinder to Get Panic Button and Catfish-Fighting Facial Recognition In an effort to keep users safe – and when it comes to Tinder or other dating apps, that means keeping them from being raped, murdered or even, in one horrific case, dismembered. Tinder is incorporating a panic button into the app, as well as Artificial
5 Ways Businesses Can Avoid Phishing Scams Online
5 Ways Businesses Can Avoid Phishing Scams Online The concept of phishing is gaining immense popularity during the Covid-19 pandemic. People, by and large, are becoming victims of such fraudulent activities. Therefore, we have come up with 5 ways businesses can avoid getting trapped with emails that are meant to deteriorate their online identity. Based
5 Signs You’re Being Catfished on Tinder
5 Signs You’re Being Catfished on Tinder – What You Need to Know and What You Can Do About it Thanks to advancing technology, the use of dating apps like Tinder, has made it possible to meet the love of your life. In fact, it’s more common than you think, with 1 in 5 relationships
Website or Hacker Trap? Here’s How to Tell
How to Know if the Website is a Hack According to defectors, North Korea’s cyber army has about 7,000 hackers. Their job is to wreak havoc on the country’s enemies. Recently, North Korean hackers targeted cybersecurity researchers in the U.S. North Korean hackers set up a fake cybersecurity company called SecuriElite. They also created fake
A Can of Phish Bait: from Surveys to Rule Changes to Your Boss’s Boss
Employees need to continue being wary of phishing scams as they begin to return to the office, according to Roger Kay at INKY. Kay describes several phishing templates that INKY has intercepted in recent months, including one that informed recipients that they needed to fill out a compliance form related to COVID-19 risks. “Reasonably well
Spoofing Tailored to Financial Departments
Researchers at Area 1 Security have warned of a large spear phishing campaign targeting financial departments and C-suite employees with spoofed Microsoft 365 login pages. The researchers say that in some cases the attackers “specifically targeted newly-selected CEOs during critical transitionary periods.” Additionally, the attackers went after executives’ assistants. “Beyond financial departments, the attackers also
Why Should You Be Using DMARC? 3 Billion Spoofed Emails are Being Sent Everyday
In a recent report from TechRadar, email is still the most popular form of malware distribution. Billions of emails that are spoofed are being sent everyday. Even though email is still the oldest form of online communication, it is still the go-to platform for cybercriminals to attempt to infiltrate. According to the report by Vailmail,
Think Your Cyber Insurance is Going to Cover that $6 Million attack in Cyber Fraud? Think Again.
The latest tale of an organization falling victim to a business email compromise cyber attack on their credit card processor highlights how very specific the scenario needs to be to see a payout. In 2018, RealPage, a Texas-based service provider for property owners and property management companies was the victim of a cyber attack that
1 in 4 Business Email Compromise Attacks Use Lookalike Domains to Trick Victims
The latest Data on BEC scams shows how the bad guys are using a mix of Gmail accounts, increases in stolen wire transfers, and a shift to payroll diversions to trick you out of your money from email attacks.
Phishing Attacks Continue to Impersonate Trusted Brands to Deceive Potential Victims
The use of impersonation in phishing attacks helps to establish credibility and a sense of ease. New data shows exactly how the bad guys are using this tactic to their advantage. We’ve covered impersonation scams before where cybercriminals pretend to be your CEO, hospital personnel, or even the government. New data from cybersecurity vendor Agari
Vendor Email Compromise is Officially A Big (Seven-Figure) Problem
While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to
Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials
A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its
Most Phishing Emails Are After Credentials
Most Phishing Emails Are After Credentials 57% of phishing emails in 2020 were designed for stealing credentials, according to Cofense’s most recent Annual State of Phishing Report. Meanwhile, just 12% of phishing attacks last year were used for delivering malware. Cofense believes this is because credential phishing emails are better at bypassing email security filters
Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks
Microsoft Dominates as the Most Impersonated Brand in Phishing Attacks
Security admins checklist: 10 tasks to perform every year
Here is a checklist of 10 important tasks security administrators should perform to keep devices protected and secure. Security administrators oversee the secured processes in place, safeguarding the day-to-day operations of an organization. While it is easy for users to focus solely on protecting computers and their devices, security admins are tasked with managing the overall
5 Tips to Avoid Spear-Phishing Attacks
Avoid Spear-Phishing Attacks With These 5 Tips The word “Burisma” is all over the news at the moment – it’s a Ukranian energy company that, according to some claims, was broken into by Russian hackers looking for sensitive data to steal. As you can imagine, the way the hackers got in is supposed to have
These Subject Lines Are The Most Clicked For Phishing
Most Clicked Phishing Subject Lines To Link You Phishing comes in many forms of disguises to hook you. The most successful email lures don’t promise riches, but issue imminent cybersecurity warnings or urgent office messages, a report reveals. By now, even the least-seasoned email user knows not to open messages from Nigerian princes or vacationing