Your Neighbor Is Calling But Don’t Answer

Posted on September 20, 2017 by Admin

Here’s a scenario. You’re sitting at your desk and your phone rings.  The caller ID shows a phone number that is very similar to your own, yet it still isn’t familiar to you right away. However, because the area code and next three digits are identical to yours, you think “Maybe it’s my neighbor,” and you pick it up. The voice on the other end is the familiar robotic voice letting you know "you have won a resort package to a fascinating destination!" You sigh.

These types of robocalls have

Read More...

Posted in

Iron Man Is Taking Your Money In This Resurfaced Scam

Posted on September 13, 2017 by Admin

Movie stars have all the luck. Everyone wants to be them, including cybercriminals. Robert Downey Jr., who is perhaps most well known as playing Iron Man in the recent Marvel movies is warning his fans that someone is impersonating him and asking for “contributions” to various “causes.”

 

This is not a new scam, but it seems it is making the rounds again. Watch out for any request that is supposedly from someone famous. Other famous names impersonated in this scam include musicians Brad

Read More...

Posted in

Commerce Related Data Breaches Surge 35% In A Single Year

Posted on September 12, 2017 by Admin

It’s a world of online convenience we’ve grown to love. But with that ease comes a hefty price to pay. Shopping, banking, travel, and other e-commerce gives data hackers the opportunities of a lifetime. The Identity Theft Resource Center reports a 35% increase in identity theft over just this past year. Companies both gigantic and small face omnipresent data security threats as part of the price of doing business online. Just how to best protect themselves and their customers is a difficult

Read More...

Posted in

Brute Force Attack Targets Office 365 Accounts; Reminder To Use Unique Passwords

Posted on September 5, 2017 by Admin

A brute force attack is a method of attack using automated systems that generate a large number of consecutive guesses to retrieve its targeted information. This means whoever is attacking wants encrypted data, such as passwords for various accounts. In a recent case, Skyhigh Networks found this being used in attempts to get corporate users’ Office 365 account information. They were pretty sneaky about it too. The pattern of attack was slow and methodical to escape detection.

Skyhigh

Read More...

Posted in

Tools of the Cybercriminals and Tips to Avoid Becoming Their Next Victim

Posted on September 1, 2017 by Admin



Cyberthieves have many tools at their disposal to commit their crimes. Below is a brief description of many of them and how you can help yourself avoid becoming their next victim.

Phishing – It’s called this because the scammers are “fishing” for sensitive information. Often it is for your bank account. Usually, an email message is received with an included link or attachment. If they are clicked, a website appears (often that looks nearly identical to your financial institution) with a form

Read More...

Posted in

Newly Discovered Ransomware Hides In Innocent-Looking Images

Posted on August 29, 2017 by morganr



August 28, 2017

Researchers have found a new type of ransomware that can encrypt your files and it’ll cost you over $400 to get the secret codes to decrypt them. It hides components within innocent-looking image files and can make it past spam filters and end up in your email inbox.

This is being referred to so far as SyncCrypt. An email is sent that has an attachment that appears to be “court orders” of some type. If that file is opened, images pop up that seem harmless enough, but are

Read More...

Posted in

Banking Malware On The Rise Once Again Thanks To Two Familiar Bots

Posted on August 25, 2017 by morganr


Banking Malware On The Rise Once Again Thanks To Two Familiar Bots
August 25, 2017

It’s being reported that while financial institutions were formerly on a downward trajectory with respect to malware attacks, it has since changed. These organizations are reporting an uptick in malware sightings and they are not limiting their targeted currencies to the traditional. Crypto-currencies are also in the crosshairs. And causing this riff are the financial industries’ biggest malicious enemies.

Read More...

Posted in

Smishing Is The New Phishing

Posted on August 24, 2017 by morganr


Smishing Is The New Phishing
August 24, 2017

From time to time, scammers come up with a new tactic using new technology, new events, or whatever they can to continue tricking us into giving up our personal or confidential information. Something that has come into favor in the past few years has been coined as “smishing.” Yes, it’s an odd word, but it’s descriptive and it most certainly works on some people. As long as you know what to watch for, you can take preventative action and not be

Read More...

Posted in

Evolved Malware Takes Advantage of Accessibility Features

Posted on August 23, 2017 by morganr


Evolved Malware Takes Advantage of Accessibility Features
August 23, 2017

There have been some pretty relentless instances of banking malware over the years. One of the more dangerous ones has now been modified and “improved” to take advantage of the functions on Android devices that assist those with disabilities. The accessibility features allow voice commands and voice feedback, use of braille accessories, and other tools to assist users with navigation and use of smartphones and tablets.

Read More...

Posted in

The Top Breaches So Far in 2017 Demonstrate Success for Cybercriminals

Posted on August 22, 2017 by morganr


The Top Breaches So Far in 2017 Demonstrate Success for Cybercriminals
August 22, 2017

It’s been a pretty successful year for hackers when it comes to data breaches. Some of them were against some pretty high-profile targets too. Surprisingly, only one of the 10 largest and highest profile cyberattacks so far this year was a ransomware attack. Only one was due to malware making its way onto a point of sale system (POS). A lesson that can be learned from the below list is that it is incredibly

Read More...

Posted in

Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint