New Phishing Exploit Leaves Android Phones Vulnerable

New Phishing Exploit Leaves Android Phones Vulnerable

Got an Android Phone? You’re going to love this. Attackers can now take control of your phone over-the-air. From Check Point Research, “Check Point Researchers have identified a susceptibility to advanced phishing attacks in certain modern Android-based phones, including models by Samsung, Huawei, LG and Sony. In these attacks, a remote agent can trick users

View Full Post
Phishing Attacks Now Coming in Stages

Phishing Attacks Now Coming in Stages

It never ceases to amaze how clever hackers are or how far they’ll go to phish someone. Whenever they find a flaw in their attack methodology, eventually, they figure out a way to overcome it. Normally, a phishing attack will try and lure victims to a website to steal their credentials. The phishing website is

View Full Post
Threats From Obsolete Phishing Protection: Are You Safe?

Threats From Obsolete Phishing Protection: Are You Safe?

The rate of cybercrimes has risen drastically across the globe in recent times. The advanced technology, the sophistication of attack methods used, and seemingly legitimate appearance of today’s phishing emails are a testimony of the strides of advancement that the phishers and cybercriminals have made in the past decade. However, the advice for securing ourselves

View Full Post
Phishing Prevention: Email Providers Aren’t Helping Any

Phishing Prevention: Email Providers Aren’t Helping Any

How many employees have to get phished before they take action? How much ransomware has to be paid before they take action? How many personal records have to be stolen before they take action? What will it take for email security service providers to install phishing protection technology and protect their customers? Apparently they haven’t

View Full Post
One Phishing Filter is Not Enough Which is Why You Need Six

One Phishing Filter is Not Enough Which is Why You Need Six

A recent article on the Help Net Security website discussed the results of research into the effectiveness of phishing filters. Phishing filters are used in email security to scan emails for malicious links or attachments. Phishing filter technology is becoming widely adopted and it’s generally thought to be pretty effective at preventing phishing attacks. That’s

View Full Post
13 Spear Phishing Attacks Examples To Justify Investment For Phishing Prevention Solutions In Your Organization

13 Spear Phishing Attacks Examples To Justify Investment For Phishing Prevention Solutions In Your Organization

Spear Phishing is a type of phishing attack which generally targets “Whales” or “high-level organizational actors” such as C-suite executives (e.g., CEO, CFO, CIO, etc.) or upper management to steal financial and sensitive or confidential information from unsuspecting top-level management. Spear phishing data breaches account for more than half of the phishing scams worldwide, which

View Full Post
Spear Phishing: The Greatest Threat to Democracy

Spear Phishing: The Greatest Threat to Democracy

What’s the greatest threat to democracy today? How about election results that can’t be trusted because the election was manipulated by hackers. Hackers who began their attack with a spear phishing campaign. It’s happened before. It will almost certainly happen again. Manipulating campaigns is now part of the election process. And the number of ways

View Full Post
Reeling in a Different Kind of Phish at Sea

Reeling in a Different Kind of Phish at Sea

Fishing can be a very profitable enterprise. Many commercial fishing fleets head out to sea each day hoping to land a big catch. Now these same boat owners have to be careful the big catch doesn’t land them.  According to an article on the Hot for Security website, “An alert released on Monday cautions that

View Full Post
What to do If You’re Hit by Ransomware

What to do If You’re Hit by Ransomware

There’s much debate going on today about what to do if your organization gets hit by ransomware. There’s really only two choices: pay it or don’t. And which side you come down on says a lot about your big picture perspective. Recently, U.S. Mayors, at their yearly conference, which represents over 1,400 mayors from U.S.

View Full Post
Death, Taxes and the Evolution of Phishing Attacks

Death, Taxes and the Evolution of Phishing Attacks

They say nothing is certain in life except for death and taxes. You can add one more to that list: phishing attacks. Hackers continue to do their homework and innovate as the number one cybersecurity threat refuses to be contained. According to an article on the Dark Reading website, “Email continues to be an extremely

View Full Post
When the Department of Homeland Security isn’t so Secure

When the Department of Homeland Security isn’t so Secure

From its website, the Department of Homeland Security’s (DHS) mission is “to secure the nation from the many threats we face.” In essence, the DHS’s job is to create trust, for Americans, in their own security. So, it shouldn’t come as any surprise that hackers would try to exploit that trust by launching an email

View Full Post
Ever Heard of an Angler Phishing Attack?

Ever Heard of an Angler Phishing Attack?

You wouldn’t put up a neon sign outside your home that says “rob this house” before you left for a week’s vacation.  The last thing you want to do is give a crook a heads up. But that’s exactly what people unwittingly do when they post complaints about companies they do business within their social

View Full Post
Five Phishing Tactics Sure to Trick You Into Clicking

Five Phishing Tactics Sure to Trick You Into Clicking

By now, most people know that 91% of cyberattacks start with a phishing email. In recognition of this, companies are now beginning to offer security awareness training. According to an article on the website Dark Reading, “45% of organizations provide employees mandatory, formal cybersecurity training; another 10% give optional training.” The objective is simple: teach

View Full Post
Everyone Loves PDFs Including Hackers

Everyone Loves PDFs Including Hackers

If you’re doing business, then you’re sending, receiving and reading PDFs. PDFs have become ubiquitous in business as a way of sending documents over the web. And why not? There are a lot of advantages to using PDFs. For starters, it’s ubiquitous—everyone has a PDF reader. The files can include embedded links and images. The

View Full Post
The Problems With Paying a Phishing Ransom

The Problems With Paying a Phishing Ransom

If you haven’t been paying attention, a lot of organizations have been hit by ransomware lately, almost all of which are triggered by a phishing email. Hackers use all types of exploits to extract money from their victims too. Their favorite, by far, is to encrypt the victim’s hard drive with a promise to decrypt

View Full Post