PhishProtection – 2020 Scholarships Program

PhishProtection – 2020 Scholarships Program

Please find below details for the PhishProtection.com Scholarships program. PhishProtection offers phishing prevention solutions for SMB, enterprise and universities at phishprotection.com We are a service of DuoCircle LLC, an email security company designed from the ground up to provide all the features that an enterprise would expect but priced for small and medium businesses. More

View Full Post
Using Microsoft’s OneDrive? Be Afraid, be Very Afraid.

Using Microsoft’s OneDrive? Be Afraid, be Very Afraid.

Cloud-based storage is a wonderful thing. Being able to store your files and retrieve them from anywhere boosts productivity. It should come as no surprise then that Microsoft entered the cloud-based storage arena back in 2007. It should also come as no surprise that Microsoft’s cloud-storage product, called OneDrive, is the target of and vehicle

View Full Post
Cybersecurity Updates For The Week 46

Cybersecurity Updates For The Week 46

There is no denial of the fact that the advancement of technology has reached greater heights in the world of the attackers. Now and then, the name of some new form of a cyber-attack can be heard or read. These attacks are so well planned and executed that as users of the internet, anything we

View Full Post
The Multiplying Effect of Vendor Email Compromise

The Multiplying Effect of Vendor Email Compromise

By now, most people know about the potential threat from business email compromise or BEC. With BEC, someone in a company gets their email taken over by a hacker and the hacker uses the trust implied in that email to exploit others in the company. “Formerly dubbed as Man-in-the-Email scams, BEC attackers rely heavily on

View Full Post
Cybersecurity Updates For The Week 45

Cybersecurity Updates For The Week 45

Recent years have witnessed a significant upsurge in the rate of cybercrimes. Not only has the frequency of attacks increased, but even the methods used for launching cyberattacks have also been evolving to include the most sophisticated and unique forms of phishing that phishing prevention almost becomes an unattainable goal for many. However, the least

View Full Post
Phishers Sure are Cold-hearted

Phishers Sure are Cold-hearted

When you tell me that phishers go after large enterprises, I get it. There’s a lot of valuable data there. When you tell that they go after banks, cause that’s where the money is, I understand. But, when you tell me they’re going after relief agencies, I call them cold-hearted. That’s the news making headlines

View Full Post
Cybersecurity Updates For The Week 44

Cybersecurity Updates For The Week 44

The rate at which cybercrimes are propagating is beyond the imagination of an ordinary mind. All we can say is that the ill-motivated have begun to outnumber and outsmart the good actors in the cyberworld. This becomes evident in the endless stream of failed phishing prevention measures that lead to major cybercrimes such as identity

View Full Post
User Accounts On Netflix Hacked By The Thousands

User Accounts On Netflix Hacked By The Thousands

Netflix, the popular online entertainment and video streaming site, has millions of subscribers and hence is a tempting target for the cybercriminals that look to hack into email accounts to gain illegitimate access to services. When they target many, even a small percentage of success could mean something significant. 

Cybersecurity Updates For The Week 43

Cybersecurity Updates For The Week 43

Cybersecurity is a growing concern across the globe. But as more and more people are gaining awareness about the importance of anti-phishing solutions, there are all the more instances of cybercrimes recorded. There is little doubt that the increase in the adoption of cybersecurity measures is followed by a parallel and perhaps more significant increase

View Full Post
Time for Your Yearly Performance Appraisal? Maybe not!

Time for Your Yearly Performance Appraisal? Maybe not!

If you work at an organization, there’s a pretty good chance you’re in for a yearly performance appraisal. And if you are, it’s likely that someone from human resources will send you an email around that time reminding you of that. But beware, that email may not be what you think it is. There’s a

View Full Post
Cybersecurity Updates For The Week 42

Cybersecurity Updates For The Week 42

Today’s cyberspace includes computer resources, IT networks, and all the fixed and mobile devices which connect to the internet. Because of the borderless nature of the global internet, protection of critical infrastructure operations is emerging as a significant challenge. Hackers always look to exploit the vulnerability of an unsuspecting internet user. Hence, cybersecurity experts strive

View Full Post
Hackers Show Once Again They Care About More Than Just Money

Hackers Show Once Again They Care About More Than Just Money

When you think of phishing, you probably think of ransomware (which you should). And when you think of ransomware, you probably think about money (which you should). The money the hackers are trying to get as a ransom. There’s no doubt that most phishing attacks, either directly or indirectly, are about money. But not all.

View Full Post
Why the New Instagram Anti-Phishing Tool Won’t Work

Why the New Instagram Anti-Phishing Tool Won’t Work

As previously discussed on this blog, Instagram is now more popular than Facebook when it comes to phishing attacks. As the article detailed, Instagram is popular as a target for phishing attacks because Instagram phishing attacks can so easily go viral, given that every victim can quickly lead to hundreds of more emails to trusted

View Full Post
Cybersecurity Updates For The Week 41

Cybersecurity Updates For The Week 41

Cybersecurity is a dynamic arena with some event or the other never ceasing to take place. While cybersecurity measures reach unmatched levels of sophistication and ultra protection, cyber attacks make an equal stride. Thus the stifle between the good and the bad actors of the cyber world is never-ending. However, anyone interested in these affairs

View Full Post
You’ll Never Guess Who’s Behind the Latest Phishing Attacks

You’ll Never Guess Who’s Behind the Latest Phishing Attacks

Would you believe North Korea, Nigeria and Egypt? You might think that phishing emails from these “third world” countries would be unsophisticated and easy to detect. You’d be wrong. First North Korea. According to the Digital Journal, “Several U.S. businesses have been targeted by a campaign seemingly to originate from North Korea and using the

View Full Post
Cybersecurity Updates For The Week 40

Cybersecurity Updates For The Week 40

Cybersecurity is the biggest challenge that confronts all netizens today. No matter how strong and secured a network chain is attackers manage to exploit the loopholes, using it to their benefit and misguiding the users to extract personal details. Individuals and organizations deploy anti-phishing measures, but bad actors always look forward to outsmarting them. Here

View Full Post