Category

email phishing scams
Hijacking UK Email Accounts for Phishing
There has been a significant rise in stolen corporate email accounts that are being used in phishing attempts. This is according to a new report by security experts Barracuda. The security firm is claiming email accounts from employees all over the UK are being stolen. Hackers would then log into these accounts remotely and, posing...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks
Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
Phishing : UK Tax Refund Scheme
Cybercriminals are getting an early start by promising U.K. computer users a sizable tax refund in an attempt to steal their personal data. Recipients of the email scam, which appeared to come from Her Majesty’s Revenue and Customs (HMRC) the U.K. government department responsible for collecting taxes, were told to visit a gateway portal to...
Continue Reading
E-MAIL: The Single Heaviest Security Challenge for Companies Today
E-Mail, or electronic mail is the single most effective and efficient commonplace method of communicating with someone in the business world today. Even as other methods of digital communication have come and gone, over its 40-year history, email still remains the backbone of business communications with almost 4 Billion users worldwide collectively sending 300 billion...
Continue Reading
UnityPoint Hacked
A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information,...
Continue Reading
Emails Being Recorded
Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting...
Continue Reading
Phishing attacks are the most common to affect an individual or organisation. Phishing email campaigns are easy to execute and can use a combination of different techniques in order to get someone to provide their credentials via a fake login page. These attacks won’t stop, because in this age of information it is very easy...
Continue Reading
Android Malware
A wonderful serenity has taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole heart. I am alone, and feel the charm of existence in this spot, which was created for the bliss of souls like mine. I am so happy, my dear friend, so absorbed in...
Continue Reading
Spoofed Phishing - Mailsploit iZOOlogic
The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking...
Continue Reading
Shutterstock izoologic
Cybercriminals still use emails to launch the social engineering component of a phishing or malware attack. Email content uses a “call to action’ such as a security update, web payment or refund to lure victims into clicking on the embedded link. Users are routed to fake web content or to download malicious attachment and executables....
Continue Reading
1 2 3

Categories