Death, Taxes and the Evolution of Phishing Attacks

Death, Taxes and the Evolution of Phishing Attacks

They say nothing is certain in life except for death and taxes. You can add one more to that list: phishing attacks. Hackers continue to do their homework and innovate as the number one cybersecurity threat refuses to be contained. According to an article on the Dark Reading website, “Email continues to be an extremely

View Full Post
When the Department of Homeland Security isn’t so Secure

When the Department of Homeland Security isn’t so Secure

From its website, the Department of Homeland Security’s (DHS) mission is “to secure the nation from the many threats we face.” In essence, the DHS’s job is to create trust, for Americans, in their own security. So, it shouldn’t come as any surprise that hackers would try to exploit that trust by launching an email

View Full Post
Ever Heard of an Angler Phishing Attack?

Ever Heard of an Angler Phishing Attack?

You wouldn’t put up a neon sign outside your home that says “rob this house” before you left for a week’s vacation.  The last thing you want to do is give a crook a heads up. But that’s exactly what people unwittingly do when they post complaints about companies they do business within their social

View Full Post
Five Phishing Tactics Sure to Trick You Into Clicking

Five Phishing Tactics Sure to Trick You Into Clicking

By now, most people know that 91% of cyberattacks start with a phishing email. In recognition of this, companies are now beginning to offer security awareness training. According to an article on the website Dark Reading, “45% of organizations provide employees mandatory, formal cybersecurity training; another 10% give optional training.” The objective is simple: teach

View Full Post
Everyone Loves PDFs Including Hackers

Everyone Loves PDFs Including Hackers

If you’re doing business, then you’re sending, receiving and reading PDFs. PDFs have become ubiquitous in business as a way of sending documents over the web. And why not? There are a lot of advantages to using PDFs. For starters, it’s ubiquitous—everyone has a PDF reader. The files can include embedded links and images. The

View Full Post
The Problems With Paying a Phishing Ransom

The Problems With Paying a Phishing Ransom

If you haven’t been paying attention, a lot of organizations have been hit by ransomware lately, almost all of which are triggered by a phishing email. Hackers use all types of exploits to extract money from their victims too. Their favorite, by far, is to encrypt the victim’s hard drive with a promise to decrypt

View Full Post