Category

email phishing scams
UnityPoint Hacked
A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information,...
Continue Reading
Emails Being Recorded
Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting...
Continue Reading
Phishing attacks are the most common to affect an individual or organisation. Phishing email campaigns are easy to execute and can use a combination of different techniques in order to get someone to provide their credentials via a fake login page. These attacks won’t stop, because in this age of information it is very easy...
Continue Reading
Android Malware
A wonderful serenity has taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole heart. I am alone, and feel the charm of existence in this spot, which was created for the bliss of souls like mine. I am so happy, my dear friend, so absorbed in...
Continue Reading
Spoofed Phishing - Mailsploit iZOOlogic
The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking...
Continue Reading
Shutterstock izoologic
Cybercriminals still use emails to launch the social engineering component of a phishing or malware attack. Email content uses a “call to action’ such as a security update, web payment or refund to lure victims into clicking on the embedded link. Users are routed to fake web content or to download malicious attachment and executables....
Continue Reading
Ransomware: the new kind of malware
Ransomware is one of the greatest emerging cybercrime challenges. Ransomware is the largest malware taxonomy and most phishing emails in 2016 contain ransomware. The tactic of ransomware is to hold the victim to extortion by encrypting the victim’s documents, files or disks until the person pays a ransom fee via bitcoin or voucher. The main...
Continue Reading
Domain name spaming
Phishing spam is often sent from specifically registered domain names and domain zones to increase the efficacy of the phishing attack. This means that current email authentication systems are readily bypassed. Phishing spam forms the first component of the social engineering attempt. The phishing message must appear like it has come from a legitimate and...
Continue Reading
Sending Spoofed Emails for Spear Phishing and Advanced Persistent Threat (APT) attacks.
Criminals use spoofed email domain from addresses to launch Spear Phishing and Advanced Persistent Threat malware attacks. The “FROM” address of the sender’s email is maliciously changed to the victim’s domain. From the recipients point of view the email looks and feels like an internal email. Cybercriminals can easily send an email to anyone within...
Continue Reading
WHALING – Big Game Spear Phishing
Whaling is a type of spear phishing that targets high-profile end users such as C-level corporate executives. Similar to traditional based phishing, whaling leverages social engineering against the victim and uses some technological play in the background. Whaling content – messaging and website are very personalised – this is personal – one on one –...
Continue Reading
1 2

Categories