Tag: phishing

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New phishing campaigns

Cybersecurity Threat Advisory: New phishing campaigns

Cybercriminals have started new phishing campaigns that targets organizations and individuals who were members of affected banks. Fraudulent messages are being sent in an attempt to trick victims into revealing personal/account information such as social security numbers, passwords, and account...

/ March 15, 2023
Phishing
Tech Time Warp: FTC Takes First Action Against Phishing

Tech Time Warp: FTC Takes First Action Against Phishing

“See Yourself in Cyber” is the theme of the 2022 Cybersecurity Awareness Month, encouraging computer users to recognize their own power to detect and protect themselves from cybercrime. Few of us can say that we’ve never been tripped up by...

/ October 21, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Phishing attacks targeting GitHub accounts

Cybersecurity Threat Advisory: Phishing attacks targeting GitHub accounts

GitHub alerted the public that there is an ongoing phishing campaign that is targeting its users by impersonating CircleCI continuous integration and delivery platform. These phishing attacks are designed to steal the targeted user’s account credentials and authentication codes. A...

/ September 26, 2022
Identity theft and identity fraud: What they are and how to fight back

Identity theft and identity fraud: What they are and how to fight back

The United States Department of Justice (DOJ) does not spell out any distinction between identity theft and identity fraud, saying only that they: “…are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s...

/ September 12, 2022
Partner Spotlight: How one MSP reduced phishing-related calls by 20 percent

Partner Spotlight: How one MSP reduced phishing-related calls by 20 percent

Based in Toronto, Tuor Networks is an IT managed services provider (MSP) serving customers nationally across Canada. The company provides comprehensive solutions in IT infrastructure, cloud, and outsourced IT managed services to small, medium and large businesses across a variety...

/ February 2, 2022
Tech Time Warp: Gone phishing for cybersecurity history

Tech Time Warp: Gone phishing for cybersecurity history

The theme for Week 2 of Cybersecurity Awareness Month is “Phight the Phish!” Arguably one of the most insidious forms of cybercrime, phishing relies on tricking a recipient via social engineering into handing over personal information—and sometimes installing malware in...

/ October 15, 2021
How hackers use phishing in ransomware attacks

How hackers use phishing in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...

/ October 12, 2021 / 1 Comment
Ransomware causes critical damage for businesses around the world

Ransomware causes critical damage for businesses around the world

With a rash of ransomware attacks on high-profile American companies in recent weeks, the government is urging businesses to fortify their defenses across all verticals. Ransomware has recently gone beyond holding a single business’s data hostage and is now creating mayhem...

/ June 9, 2021
New eBook: 6 Can’t-Miss Opportunities for MSPs in 2021

New eBook: 6 Can’t-Miss Opportunities for MSPs in 2021

MSPs face an unprecedented amount of exciting change and opportunities in 2021, as the world recovers from a global pandemic and the shifts in the workforce and cybersecurity landscapes that ensued because of it. The widespread emergence of 5G, AI,...

/ April 26, 2021
Q&A: Ethical hacking and pen testing to protect against phishing

Q&A: Ethical hacking and pen testing to protect against phishing

Phishing continues to be one of the biggest threats to network security, which has led to “ethical hacking” being used to protect against it. If you’re wondering why methods like ethical hacking and pen testing are necessary to stop phishing,...

/ April 13, 2021