They Should Call Black Friday Phish Friday

They Should Call Black Friday Phish Friday

It’s the most wonderful time of the year…for hackers. And while all indications are that hackers are actually getting started early this year with phishing emails, you can expect Black Friday and Cyber Monday to be the main events.

 

Global Security Mag

 

According to Global Security Mag, “Black Friday and Cyber Monday marks the traditional start to the holiday shopping season. Yet, with 39% of shoppers starting before then, cybercriminals have kicked off the season early too.” Their research indicates a 400% increase in pre-holiday phishing activity specifically targeted at “well-known online shopping sites.”

(more…)

Data Breach at Registrar Could Make Phishing Emails Even Harder to Detect

Data Breach at Registrar Could Make Phishing Emails Even Harder to Detect

At its core, phishing is a pretty simple exploit. Send a malicious email, but make it look like it comes from some person or some company you know and trust.

One of the most frequently-used phishing tactics is domain name spoofing. Domain name spoofing occurs when an attacker appears to use a company’s domain to impersonate a company or one of its employees. This can be done by sending an email with a false domain name that looks like the correct domain name, or including a link in an email to what appears to be a trusted domain.

(more…)

You’ll Need Help Keeping Your Emails Out of Gmail Spam Folders

You’ll Need Help Keeping Your Emails Out of Gmail Spam Folders

A lot of people have a Gmail account, which means marketers send a lot of emails to Gmail accounts. It sure would be nice if most or all of those emails could avoid the spam folder. Unfortunately, Google doesn’t see it that way.

According to a new report from Twilio, How Political Campaigns Can Ensure Their Email Messages Hit Home, only 3.8% of email messages from Presidential candidates made it into the primary tab of the Gmail account. What’s worse, is that 21.3% of emails ended up in the spam folder while the remaining 74.8% ended up in promotions.

(more…)

When it Comes to Phishing Tactics, We Know What Hackers Prefer

When it Comes to Phishing Tactics, We Know What Hackers Prefer

Here’s a quick, one-question quiz:

If you got phished, you most likely:

  1. Opened a malicious email attachment
  2. Clicked on a malicious link in an email

Well, according to Proofpoint’s Q3 2019 Threat Report, if you got phished, there’s an 88% chance it’s because you clicked on a malicious link. So, the correct answer is #1. And that’s just one of the findings in the latest quarterly report.

(more…)

Beware of the Latest Office 365 Login Phishing Scam

Beware of the Latest Office 365 Login Phishing Scam

Microsoft forms a natural base of the computer world. Almost every big or small organization makes use of the tools provided by Microsoft for their daily operations. Initially, Microsoft Office had a few tools. But because they have the basics done right, the enterprise has now expanded to a lot of other utilities. Outlook 365 is such a tool from Microsoft that has above 150 million users in the corporate sector. The platform combines every facility that one would ever need for the smooth functioning of their business, such as storage of files, exchange of emails, etc. It also features seamless integration of  OneDrive as well as SharePoint into one platform.

(more…)

The Silly Case of Unenforced DMARC

The Silly Case of Unenforced DMARC

If you have any kind of alarm in your home, like a smoke detector or burglar alarm, you probably don’t think about how it works very often. As it turns out, every alarm, to be effective, actually has to do two things: it has to sense something bad and then it has to take action. In most cases, that action is to blast a really loud signal. Loud enough to wake you up from a sound sleep.

(more…)

How You And The US Presidential Hopefuls Need To Deploy Better Email Security Solutions

How You And The US Presidential Hopefuls Need To Deploy Better Email Security Solutions

In today’s digital age, emails have become a crucial channel of communication for all organizations. Emails have various benefits, such as reliability, economy, and mobility. Since we exchange a lot of important and sensitive data through emails, it is no wonder that users are seeking the best and latest solutions to uphold the confidentiality of their email contents. Any exposure of the vital information to the wrong people is enough to cripple an organization’s functioning. And a single click on a malicious link is all it takes to compromise the confidential data of an enterprise. Hence, email security plays a crucial role in enterprise networking, and email encryption is the appropriate way to secure emails.

(more…)

Can You Count On Your Employees For Phishing Protection?

Can You Count On Your Employees For Phishing Protection?

Phishing attacks are endless, escalating in numbers, frequency, and intensity with phishers launching hundreds of thousands of attacks every day. You may be wondering why authorities can’t keep check of this nefarious activity. Well, what makes it so challenging to prevent these attacks is the fact that the attackers are tech-savvy people who are professionals in what they do, and they keep on improving their techniques and modus operandi. However, one can adopt anti-spam measures and phishing protection strategies to protect oneself to a great extent, if not entirely, from these cyber threats.

(more…)

The Terrible Price Small Businesses Pay for a Data Breach

The Terrible Price Small Businesses Pay for a Data Breach

By now you probably know what comes before a data breach: a phishing attack. Phishing is the attack vector the bad guys use most often to steal the credentials which lead to the data breach. Did you ever ask yourself what comes after a data breach? Well, if you’re a small business, the answer is not good.

From Stay Safe Online, “A new survey released by the National Cyber Security Alliance (NCSA) today found that an overwhelming majority of small businesses believe that they are a target of cybercriminals, highlighting the growing awareness among small businesses about the threat of a cyberattack.”

 

cyberattack

 

(more…)

Online Security Awareness Training – A Necessity In Today’s Digital Age

Online Security Awareness Training – A Necessity In Today’s Digital Age

In today’s era of unlimited internet access, users often end up sharing their personal information on different websites, applications, and portals. However, personal information is not the only commodity at stake here. Cyberattacks pose a grave threat to corporate resources as well. Thus, the administration needs to educate their employees about the latest cyber threats. Furthermore, if an organization wants to follow different industrial and government compliances such as PCI, HIPAA, FISMA, and Sarbanes-Oxley, then on-campus or online security awareness training for employees is a necessity for them.

(more…)

Pin It on Pinterest