by Brad | Jun 13, 2019 | Cybersecurity
Cybersecurity is a dynamic field of information and digital technology world and witnesses important events every single day of the year. These might either be the actions of hackers that are in the news or the anti-phishing or information security control measures adopted by the organizations trying to protect their information assets from those adversaries.
To bring you up to speed, here are some of the most relevant cybersecurity-related news updates of this week:
(more…)
by Brad | May 27, 2019 | Cybersecurity
Digital Space is full of random activities which are taking place every day – new breaches, cyber-attacks, laws & regulations etc. Everybody needs to be updated with all news related to anti phishing security and events taking place around them to protect their information systems, networks and organizations from external and internal threat vectors. Here are all the latest news updates, curated to provide information about everything that is happening in the cyberspace:
(more…)
by Brad | May 20, 2019 | Cybersecurity
Cybercriminals once again made headlines this week causing service interruption, hacking into user accounts, tricking users to clicking on a fraudulent link in an email, and many more data breaches. The news was all over the place about the on-going cyber trends, including newspapers, news websites, and blogs. Hence, it is imperative for cyber-security experts, researchers, analysts, (more…)
by Brad | May 13, 2019 | Cybersecurity
Cybersecurity is paramount for any business in the digital age. Organizations are trying hard and spending millions of dollars in keeping themselves secure from any cybersecurity breach in their information systems. The cyber incidents take place every day causing significant loss to not only the reputation of the enterprise but also results in financial losses and regulatory issues. Let’s have a look into some of the most widely discusses cyber security incidents and news in cyberspace in recent last week.
(more…)
by Brad | May 4, 2019 | Cybersecurity
The Russian meddling in 2016 US Presidential election is well known and is an example of how a state-sponsored social media campaign can provoke or amplify social and political disruptions in a country, but the most crucial part which is often overlooked in the entire episode is the scale of ‘Spear Phishing Cyber Attack’.
(more…)
by Brad | May 3, 2019 | Cybersecurity
QBot -also referred to as QakBot- is a polymorphic Trojan that has been designed to steal financial information from the computer devices it infects. A Trojan malware is one which has capabilities to replicate itself, but QBot is exceptional in the sense that this Trojan can undergo sophisticated modification to provide attackers with enhanced capabilities and can then be spread through either networks or removable storage devices.
(more…)
by Brad | Mar 18, 2019 | Cybersecurity
Meet the Phish Protection Team at CloudFest
It’s happening in Rust, Germany, and we want you to be there!
CloudFest 2019 is where cloud and hosting professionals to join together to explore and challenge the future of internet technology. Guaranteeing an electrifying experience for all, attendees can expect to hear compelling keynote speakers, attend cool breakout sessions and be provided loads of opportunities to network via the many, high-spirited after-parties taking place during the seven-day festival.
March 25 through 29, 2019 — EuropaPark, Rust, Germany, Booth #R13
by Brad | Mar 12, 2019 | Cybersecurity
You can tell hackers are clever when they start to use the things you trust the most to exploit you.
If you spend any time on the internet then surely you have encountered reCAPTCHA. reCAPTCHA, a system designed to establish that a computer user is human, was developed by engineers as Carnegie Mellon University and later acquired by Google.
(more…)
by Brad | Jan 30, 2019 | Cybersecurity, Phishing Awareness
One of the easiest ways to get hacked is through a phishing email. Phishing emails contain either a malicious attachment or include an embedded link to a malicious website.
Of course, many people are getting wise to phishing emails and aren’t so easily fooled. But what if you receive a phishing email from the last place you’d ever expected to receive one from? Would you still have your guard up?
A recent study by news agency Axios discovered that only 6% of news organizations deploy DMARC on their email newsletters. DMARC (Domain-based Message Authentication, Reporting and Conformance) is a sophisticated but widely-available technology that ensures emails are authentic.
The study found that of 98 news sites tested, only one had fully operational DMARC. “The list of sites not protected by DMARC includes influential news sources, from the New York Times and USA Today to Fox and NBC networks to Voice of America and major international outlets.”
Without DMARC deployed, hackers can compromise email newsletters to send out fake news and potentially compromise an election. Or worse. They could use the compromised newsletters to send phishing emails to all the recipients.
Hackers are getting more sophisticated. They target emails they know have a high likelihood of getting the recipients to lower their guard. Until news organization start deploying existing technologies like DMARC to protect their readers, it’s incumbent upon the readers to protect themselves. Fortunately, there are easy-to-deploy, inexpensive, cloud-based email protection solutions like PhishProtection.
To learn more about how PhishProtection can protect you from news organization phishing attacks and many other vulnerabilities,
by Brad | Aug 11, 2018 | Cybersecurity, Office 365, Phishing
Office 365’s security features won’t protect users from all cyber security threats.
Microsoft’s cloud-based Office 365 user base is growing at a steady rate. Since the office platform first outperformed Google Apps in 2015, it’s seen a constant uptick in activity.
Now, Microsoft reports it counts its Office 365 users in the hundreds of millions. However, enterprise usage does not always equal enterprise value – particularly when it comes to cybersecurity as it misses out providing office 365 advanced threat protection for users.
(more…)
by Brad | Aug 3, 2018 | Advanced Threat Defense, Cybersecurity, Phishing
Phishing attacks follow five key steps. Effective cybersecurity prevents them at each one.
“I’d never fall for that.”
“It’ll never happen to me.”
“They’re not interested in companies like ours.”
Almost every cybercrime victim has said words like these at one time or another. Anyone who believes that they, their company, or their colleagues are too street-smart to be victimized by cyber attacks doesn’t know just how sophisticated these attacks can be.
(more…)