Author Archives: Admin

Nearly 1.4 Million New And Unique Phishing Sites Created Monthly

Posted on October 19, 2017 by Admin

If you take the Public Service Announcements (PSA) from the FBI seriously, you will be a bit on edge about one in May. It claimed that phishing scams cost businesses in the United States over $500 million each year. That’s nothing to cough at. In fact, phishing scammers are taking advantage of phishing at breakneck rates. Webroot recently released its Quarterly Threat Trends Report breaking the news that 1.385 million new and unique phishing sites are created each month.

Unfortunately, there

Read More...

Posted in Cybersecurity, Social Engineering

WiFi Flaw Leaves Everyone At Risk

Posted on October 16, 2017 by Admin

It is not a trick and most certainly, is not a treat.  A researcher from a university in Belgium has discovered a weakness that can be exploited in nearly all WiFi routers. It is cleverly being referred to as KRACK, which is an acronym for “key reinstallation attacks.” Suffice it to say, that anyone using a WiFi connection is vulnerable to possible attack until the patches are released from the vendors.

All operating systems have this flaw, but the most at risk is Android 6.0 (Marshmallow)

Read More...

Posted in Cybersecurity, Social Engineering

Research Shows Americans Lack Cybersecurity Smarts

Posted on October 12, 2017 by Admin

Research shows that a majority of American adults who go online have limited knowledge and understanding of cybersecurity basics. It’s important to be aware of the prevalent threats and how to protect against them. Tools installed at the perimeter of any network can only do so much. No matter how many of those tools are installed on any network, a simple phishing email can bypass them and land in a user's inbox. Social engineering is a powerful method for hackers because they count on

Read More...

Posted in Cybersecurity, Social Engineering

New Phishing Campaign Delivers Fake Invoices

Posted on October 9, 2017 by Admin

The name Dridex may be familiar to some. Recently, it was found by researchers at Trustwave in yet a new form that targets users of the cloud-based accounting firm, Xero. It is one of the most notorious banking Trojans and is designed to hang out on the infected computer and monitor browsing activity. It lurks in the background just waiting to steal sensitive information that is related to financial institutions in a list. It’s been active over the past year and has been evolving with each

Read More...

Posted in Cybersecurity, Social Engineering

Research Shows Americans Still Don’t Practice Good Password Use

Posted on October 6, 2017 by Admin

A recent survey by Wakefield Research provides an eye-popping glimpse into how Americans have gotten sluggish with their passwords. An unsettling 81% agree they use the same passwords for  more than one account. However, those surveyed are savvy users who know the dangers of reusing passwords; yet they still do it. And for millennials the news is worse. An incredible 92% admit they use the same password for many accounts over many sites. This disturbing trend isn’t unique to Americans and

Read More...

Posted in Cybersecurity, Social Engineering

How To Build an Incident Response Capability (That Doesn’t Suck)

Posted on October 4, 2017 by Admin

You’re standing on the bridge of the Starship USS Enterprise.

“Warning,” comes the voice of the computer. “Incoming attack detected.”

Immediately, your crew launch into action. Under your command, your officers identify the threat, take evasive action, and shut down the enemy using photon torpedoes.

The confrontation is intense, but within minutes your victory has been assured.

Sounds good, doesn’t it?

But here’s the thing. If you’ve ever seen Star Trek, you’ll know that all the screen

Read More...

Posted in Cybersecurity, Information Security, Security Awareness Training, Social Engineering

Amazon Reviewers Gifted $50 In Exchange For Their Prime Credentials

Posted on October 3, 2017 by Admin

Are you one of the 80 million Amazon Prime members who gets excited for “Prime Day" and subsequently becomes all giddy like a child with a new toy when your purchases arrive in two days? If you are, you may be targeted with a phishing scam that seeks to get your Prime login credentials out of you. This new one asks you to conveniently review your Amazon Prime Day purchases by clicking a link in an email and promises $50 gift card.

Unfortunately, it’s a phony site and there is no gift card.

Read More...

Posted in Cybersecurity, Social Engineering

FTC Warns Of Vishing Increase Following Equifax Breach

Posted on October 2, 2017 by Admin

The Federal Trade Commission (FTC) is sending out warnings to consumers about an uptick in vishing following the recent data breach of one of the three major credit bureaus, Equifax. Vishing is a form of phishing, where the scammers place a phone call to a potential victim requesting sensitive or personal data. The warning emphasizes that any calls from anyone claiming to be from Equifax are fraudulent.

The agency also is providing additional tips to help consumers after the breach that

Read More...

Posted in

Medicare Fights Fraud With New ID Cards

Posted on September 29, 2017 by Admin

Medicare knows the information safety of its many members is at risk. There’s been a steady increase in identity fraud for seniors, with 2.1 million reported cases in 2012 growing to 2.6 million in 2014. That’s one big reason Medicare is introducing new replacement cards for all fifty million-plus  members. The newly designed (and still red, white and blue) cards will begin mailing in April 2018 and finish by April 2019. The new card takes a major step toward improving the safety of member

Read More...

Posted in

Your Neighbor Is Calling But Don’t Answer

Posted on September 20, 2017 by Admin

Here’s a scenario. You’re sitting at your desk and your phone rings.  The caller ID shows a phone number that is very similar to your own, yet it still isn’t familiar to you right away. However, because the area code and next three digits are identical to yours, you think “Maybe it’s my neighbor,” and you pick it up. The voice on the other end is the familiar robotic voice letting you know "you have won a resort package to a fascinating destination!" You sigh.

These types of robocalls have

Read More...

Posted in

Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint