Posted on September 20, 2017 by Admin
Here’s a scenario. You’re sitting at your desk and your phone rings. The caller ID shows a phone number that is very similar to your own, yet it still isn’t familiar to you right away. However, because the area code and next three digits are identical to yours, you think “Maybe it’s my neighbor,” and you pick it up. The voice on the other end is the familiar robotic voice letting you know "you have won a resort package to a fascinating destination!" You sigh.
These types of robocalls have
Posted on September 13, 2017 by Admin
Movie stars have all the luck. Everyone wants to be them, including cybercriminals. Robert Downey Jr., who is perhaps most well known as playing Iron Man in the recent Marvel movies is warning his fans that someone is impersonating him and asking for “contributions” to various “causes.”
This is not a new scam, but it seems it is making the rounds again. Watch out for any request that is supposedly from someone famous. Other famous names impersonated in this scam include musicians Brad
Posted on September 12, 2017 by Admin
It’s a world of online convenience we’ve grown to love. But with that ease comes a hefty price to pay. Shopping, banking, travel, and other e-commerce gives data hackers the opportunities of a lifetime. The Identity Theft Resource Center reports a 35% increase in identity theft over just this past year. Companies both gigantic and small face omnipresent data security threats as part of the price of doing business online. Just how to best protect themselves and their customers is a difficult
Posted on September 5, 2017 by Admin
A brute force attack is a method of attack using automated systems that generate a large number of consecutive guesses to retrieve its targeted information. This means whoever is attacking wants encrypted data, such as passwords for various accounts. In a recent case, Skyhigh Networks found this being used in attempts to get corporate users’ Office 365 account information. They were pretty sneaky about it too. The pattern of attack was slow and methodical to escape detection.
Posted on September 1, 2017 by Admin
Cyberthieves have many tools at their disposal to commit their crimes. Below is a brief description of many of them and how you can help yourself avoid becoming their next victim.
Phishing – It’s called this because the scammers are “fishing” for sensitive information. Often it is for your bank account. Usually, an email message is received with an included link or attachment. If they are clicked, a website appears (often that looks nearly identical to your financial institution) with a form
Posted on August 29, 2017 by morganr
August 28, 2017
Researchers have found a new type of ransomware that can encrypt your files and it’ll cost you over $400 to get the secret codes to decrypt them. It hides components within innocent-looking image files and can make it past spam filters and end up in your email inbox.
This is being referred to so far as SyncCrypt. An email is sent that has an attachment that appears to be “court orders” of some type. If that file is opened, images pop up that seem harmless enough, but are
Posted on August 25, 2017 by morganr
Banking Malware On The Rise Once Again Thanks To Two Familiar Bots
August 25, 2017
It’s being reported that while financial institutions were formerly on a downward trajectory with respect to malware attacks, it has since changed. These organizations are reporting an uptick in malware sightings and they are not limiting their targeted currencies to the traditional. Crypto-currencies are also in the crosshairs. And causing this riff are the financial industries’ biggest malicious enemies.
Posted on August 24, 2017 by morganr
Smishing Is The New Phishing
August 24, 2017
From time to time, scammers come up with a new tactic using new technology, new events, or whatever they can to continue tricking us into giving up our personal or confidential information. Something that has come into favor in the past few years has been coined as “smishing.” Yes, it’s an odd word, but it’s descriptive and it most certainly works on some people. As long as you know what to watch for, you can take preventative action and not be
Posted on August 23, 2017 by morganr
Evolved Malware Takes Advantage of Accessibility Features
August 23, 2017
There have been some pretty relentless instances of banking malware over the years. One of the more dangerous ones has now been modified and “improved” to take advantage of the functions on Android devices that assist those with disabilities. The accessibility features allow voice commands and voice feedback, use of braille accessories, and other tools to assist users with navigation and use of smartphones and tablets.
Posted on August 22, 2017 by morganr
The Top Breaches So Far in 2017 Demonstrate Success for Cybercriminals
August 22, 2017
It’s been a pretty successful year for hackers when it comes to data breaches. Some of them were against some pretty high-profile targets too. Surprisingly, only one of the 10 largest and highest profile cyberattacks so far this year was a ransomware attack. Only one was due to malware making its way onto a point of sale system (POS). A lesson that can be learned from the below list is that it is incredibly