What Happens When a Phishing Email Isn’t?

What Happens When a Phishing Email Isn’t?

Everyone’s on the lookout for phishing emails today (or if they’re not, they should be). Some people are on high alert and are really good at spotting them. Are you? What if you received an email that you were convinced was a phishing email, with all the telltale signs, but it wasn’t? That’s exactly what

View Full Post
Cybersecurity Updates For The Week 47

Cybersecurity Updates For The Week 47

Cybersecurity is an issue with growing concern among all netizens. There is barely any privacy on the internet today, and not taking the right security measures only adds on to make us all the more unsafe on the web. Hence, there are rising numbers of instances of cyber-attacks and it is because of this that

View Full Post
PhishProtection – 2020 Scholarships Program

PhishProtection – 2020 Scholarships Program

Please find below details for the PhishProtection.com Scholarships program. PhishProtection offers phishing prevention solutions for SMB, enterprise and universities at phishprotection.com We are a service of DuoCircle LLC, an email security company designed from the ground up to provide all the features that an enterprise would expect but priced for small and medium businesses. More

View Full Post
Using Microsoft’s OneDrive? Be Afraid, be Very Afraid.

Using Microsoft’s OneDrive? Be Afraid, be Very Afraid.

Cloud-based storage is a wonderful thing. Being able to store your files and retrieve them from anywhere boosts productivity. It should come as no surprise then that Microsoft entered the cloud-based storage arena back in 2007. It should also come as no surprise that Microsoft’s cloud-storage product, called OneDrive, is the target of and vehicle

View Full Post
Cybersecurity Updates For The Week 46

Cybersecurity Updates For The Week 46

There is no denial of the fact that the advancement of technology has reached greater heights in the world of the attackers. Now and then, the name of some new form of a cyber-attack can be heard or read. These attacks are so well planned and executed that as users of the internet, anything we

View Full Post
The Multiplying Effect of Vendor Email Compromise

The Multiplying Effect of Vendor Email Compromise

By now, most people know about the potential threat from business email compromise or BEC. With BEC, someone in a company gets their email taken over by a hacker and the hacker uses the trust implied in that email to exploit others in the company. “Formerly dubbed as Man-in-the-Email scams, BEC attackers rely heavily on

View Full Post
Cybersecurity Updates For The Week 45

Cybersecurity Updates For The Week 45

Recent years have witnessed a significant upsurge in the rate of cybercrimes. Not only has the frequency of attacks increased, but even the methods used for launching cyberattacks have also been evolving to include the most sophisticated and unique forms of phishing that phishing prevention almost becomes an unattainable goal for many. However, the least

View Full Post
Phishers Sure are Cold-hearted

Phishers Sure are Cold-hearted

When you tell me that phishers go after large enterprises, I get it. There’s a lot of valuable data there. When you tell that they go after banks, cause that’s where the money is, I understand. But, when you tell me they’re going after relief agencies, I call them cold-hearted. That’s the news making headlines

View Full Post