An alarming notice to employers and employees! There is an outrageous new phishing scam, affecting most of the employers and employees nationwide, with regard to their payroll service providers and direct deposits, in an attempt to steal your employees’ paychecks. Yes, you read it correctly. These cyber-criminals are going after your employees’ hard-earned income. Continue reading Employee Payroll Direct Deposits are the new targets of a phishing scam
There has been an alarming rise in phishing scams which has resulted in large volumes of data being accessed illegally by cyber criminals – phishing scams such as the Bell Canada Scam, KRACK Attack, Netflix Scam, Google Docs Phishing Scam, and many more.
Phishing scams are getting more sophisticated and harder to detect. It’s no wonder protecting an organization from cyber-attacks has become one of the most common security challenges that an organization faces today in keeping their data secure. Continue reading Basic Security Awareness Training is no longer sufficient
With over 110 million subscribers, Netflix is currently the world’s leading online subscription service for watching TV series and movies on smart TVs, PCs, mobile devices, tablets and more.
So, it’s no wonder Netflix subscribers worldwide were the latest targets of a well-designed phishing scam. Continue reading Netflix News: Users Warned of Phishing Scam
The aggregated results of a new email security analysis show over 10% average rate at which enterprise email security systems miss spam, phishing and malware attachments.
The summary of findings encompasses user mailboxes at companies tested in the Email Security Gap Analysis program during September and October 2017. Continue reading New Email Security Study Shows a Massive 10.5% Failure Rate
WPA2 (Wi-Fi Protected Access 2) is a security protocol; A popular authentication scheme used to protect personal and enterprise Wi-Fi networks. But, on Monday morning (10/16/2017), a serious weakness was discovered. The security protocol used to protect the majority of Wi-Fi connections was broken, potentially exposing wireless Internet traffic to malicious eavesdroppers and attacks. An attacker within range of a victim can exploit these weaknesses using Key Reinstallation Attacks (KRACKs). Continue reading Protect yourself from Krack Attack: A WPA2 Wi-Fi flaw
With all the ransomware attacks that have occurred, like CryptoWall, WannaCry, Petya, there’s a lot of chatter on the Internet about precautionary measures and solutions. One popular solution that’s being talked about is having a good backup for your data. But can having a good back up keep the ransomware attacks at bay? Continue reading Backups becoming more desirable for Ransomware hackers
On a given day, you tend to get anywhere from less than 10 emails to about a few hundred. Out of these emails, there’s a good chance you will get at least one or two phishing emails, which somehow bypassed your spam filter and other security rules that you have in place. If your spam filter is not currently active, turn it ON as soon as possible. Continue reading It’s time to test your employees’ phishing awareness.
The phishing threat is indeed real and is of concern to those in the financial services industry, e-business, and ISPs where their businesses are directly affected. Phishing has evolved rapidly. Initially, users were lured to a phishing site where passwords were harvested or captured by blending phishing with spyware. Now, because more companies are deploying one-time password tokens, phishers are using different techniques to attack the organizations.
Smishing is another “phishing” scam; the only difference is in Phishing, users receive a genuine-looking email that appears to be either from their bank, Internet Service Provider (ISP), favorite store, or other organization. Where as in “Smishing” messages are sent to you via SMS (text message) on your mobile phone.
You would think, being vigilant of cyber criminals that are trying to exploit us via phishing emails were enough, now we have to protect ourselves from Vishing attacks. Vishing, is just a new take on the old scam of phishing.
In one version of vishing, you will receive the typical phishing email, but instead of giving you instructions to click on a link or directing you to a fake/malicious Internet site, you’re given a “Customer Service” phone number with instructions to call the number and provide the requested information over the phone. Those who call the phone number, which is a Voice over Internet Protocol (VoIP) account and not an actual, legitimate business or financial institution, are led through a series of voice-prompted menus that ask for your personal data, such as your account number, password, and other critical confidential information. Continue reading Protect yourself and your company from Vishing Attacks