Just as the internet makes it easier to accomplish many things, such as banking, research, planning travel, shopping, and much more, it also makes it easier for scammers to carry out their virtual crimes. Thus, impacting our real-life finances, security, and peace of mind. Cyber criminals now have become quite savvy in their attempt to lure people in and get you to click on a link or open an attachment. Continue reading Spam vs. Phishing… what’s the difference?
By Sushma Chowta
While everyone seems to be busy in WannaCry ransomware, there were two other breaches which took place, one in Docusign which is a major provider of electronic signature technology and another one was Bell Canada which is Canada’s largest telecommunications company. Continue reading DocuSign Data Breach Led to Targeted Email Malware Campaign
By Sandy Bobhate
Cyber-attack is becoming the biggest threat in today’s world. Cyber-attackers can target any individuals, organizations or groups and they can steal or destroy personal/company data. Recently, a San Francisco-based electronic signature vendor became a victim of a cyber-attack. Just as the world was trying to cope with the Ransomware attack that shook every IT/NON-IT organization throughout the globe, DocuSign encountered another form of data breach attack. Such attacks are just an example of how critical users’ awareness is and should be a top priority for every organization. Users should be attentive and watchful of any suspicious email or activity from a forged source and refrain from any activity that could trigger the attack (clicking on the email, downloading an attachment, opening a link, etc.) Continue reading Data Breach Leads to Malicious Spam
By Sushma Chowta
In today’s era where everyone is using the Internet, the number of digital threats continues to grow exponentially. Various types of phishing activities are prevalent in the ecosystem. Continue reading Types of Phishing Attacks
As per the APWG (Anti-Phishing Working Group), the international coalition unifying the global response to cybercrime across industry, government and law-enforcement sectors and NGO communities, the 4th quarter 2016 report based on the phishing activity, has shattered all previous records. http://docs.apwg.org/reports/apwg_trends_report_q4_2016.pdf Continue reading Phishing attack shatters all previous year’s records
As stated on Microsoft’s Malware Protection Center blog “The cornerstone of tech support scams is the deception that there is something wrong with your PC. To advance this sham, tech support scams have long abused browsers’ full screen function. Coupled with dialogue loops, the pop-up messages that just won’t go away, and the spoofing of brands like Microsoft, tech support scam websites can be convincing.” Continue reading Tech support and Phishing scams. How to protect yourself?
By Raj Gupta, CTO Lumen21, inc.
With the explosion of Ransomware and the increase in some email messages per mailbox, my employees have become the first line of defense. So, enlightening them has become a critical factor to protecting my infrastructure and our organization. But how do I do it? Continue reading HELP!!! How do I stop my employees from clicking on everything?
Antivirus is no longer the only ammo for IT. As technology evolves, so does the threat landscape. With the new year, a new threat landscape has emerged that puts your employees as the “first line of defense”: the human firewall.
As part of C3Compliant, which started in 2013, we have since been focused on emerging threats and helping our customers educate their employees on the ongoing security challenges that face us on a regular basis. It is our responsibility to help our clients be aware of these emerging threats, to help protect themselves and their employees from critical business impacts. Continue reading Antivirus detection rates have declined