Tag: phishing
Three things to know about banking trojans
The failures of three large banks earlier this year sent shockwaves through the public. A banking crisis makes (almost) everyone nervous, which in turn creates new opportunities for social engineering, phishing, and other attacks designed to get your money. One attack we...
Cybersecurity Threat Advisory: “File Archiver in the Browser” exploits
A new skilled and clever “File Archiver in the Browser” phishing trick that utilizes ZIP domains has surfaced. Bad actors can employ this technique to deceive users into downloading malicious files, compromise systems, and potentially gaining unauthorized access. What is...
Report: 2023 spear-phishing trends
Cybercriminals continue to barrage organizations with targeted spear-phishing attacks, and many companies are struggling to keep up. In fact, Barracuda market research finds that 50% of surveyed organizations were victims of spear phishing in 2022 — and 24% had at least...
Cybersecurity Threat Advisory: New phishing campaigns
Cybercriminals have started new phishing campaigns that targets organizations and individuals who were members of affected banks. Fraudulent messages are being sent in an attempt to trick victims into revealing personal/account information such as social security numbers, passwords, and account...
Tech Time Warp: FTC Takes First Action Against Phishing
“See Yourself in Cyber” is the theme of the 2022 Cybersecurity Awareness Month, encouraging computer users to recognize their own power to detect and protect themselves from cybercrime. Few of us can say that we’ve never been tripped up by...
Cybersecurity Threat Advisory: Phishing attacks targeting GitHub accounts
GitHub alerted the public that there is an ongoing phishing campaign that is targeting its users by impersonating CircleCI continuous integration and delivery platform. These phishing attacks are designed to steal the targeted user’s account credentials and authentication codes. A...
Identity theft and identity fraud: What they are and how to fight back
The United States Department of Justice (DOJ) does not spell out any distinction between identity theft and identity fraud, saying only that they: “…are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s...
Partner Spotlight: How one MSP reduced phishing-related calls by 20 percent
Based in Toronto, Tuor Networks is an IT managed services provider (MSP) serving customers nationally across Canada. The company provides comprehensive solutions in IT infrastructure, cloud, and outsourced IT managed services to small, medium and large businesses across a variety...
Tech Time Warp: Gone phishing for cybersecurity history
The theme for Week 2 of Cybersecurity Awareness Month is “Phight the Phish!” Arguably one of the most insidious forms of cybercrime, phishing relies on tricking a recipient via social engineering into handing over personal information—and sometimes installing malware in...
How hackers use phishing in ransomware attacks
Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...