Social Media

Malicious Business Email Campaign targets Banks and Financial Service Companies

By |2018-12-28T10:34:34-06:00December 31st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , , |

Researchers have spotted and tracked a new campaign aimed at tricking employees of US financial firms and banks into downloading Houdini Malware, a self-propagating malware strain. In addition to its C2 (command-and-control) functionality, the Houdini remote access trojan (RAT) possesses the ability to move laterally, leveraging removable drives. This malware does not possess a native ransomware component. However, [...]

[Scam Of The Week] New Sextortion Attacks Take A Dark Turn

By |2018-12-12T09:55:56-06:00December 15th, 2018|Categories: Security, Cyber Security|Tags: , , , , , , , , , , , , , , , , , , |

New Sextortion Attacks Take A Dark Turn And Infect People With GandCrab Ransomware A recent report shows that last week, employees in the U.S have been bombarded by a spam attack! This attack pushes a double-whammy of a sextortion attempts combined with ransomware! Starting around May 2018, there have been a number of attack waves [...]

Marriott reveals data breach of 500 million Starwood guests!

By |2018-11-30T11:51:00-06:00November 30th, 2018|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Please read if you have ever stayed at a Marriott! For about 327 million of the 500, the breached data includes names, mailing addresses, phone numbers, email addresses, passport numbers (!), Starwood Preferred Guest ("SPG") account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences. The company said in a [...]

One in Five Employees Share Their Email Password!

By |2018-09-04T08:57:18-05:00September 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , |

Negligent employees remain the number one cause of data breaches at small businesses across America. So why do small businesses continue to struggle with good cyber security practices and what can they do to correct those habits? Small to medium-sized businesses are hit with nearly 4,000 cyber attacks per day -- and that number is [...]

SharePoint Phishing Attack Impacts 10% of Office 365 Users

By |2018-08-17T10:58:35-05:00August 15th, 2018|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , , , , , , |

The attack dubbed “PhishPoint” demonstrates the craftiness and extent cybercriminals will go to in order to harvest Office 365 credentials.   This latest attack uses several familiar aspects of Office 365 to lull potential victims into an assumption everything is above board.   Here’s how the PhishPoint attack works: The user receives the malicious email –There [...]

Second Quarter 2018 Top-Clicked Phishing Email Subjects

By |2018-07-25T11:23:13-05:00August 1st, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , , , , |

We've been reporting on the top-clicked phishing email subjects every quarter for a while now across three different categories: general emails, those related to social media, and 'in the wild' attacks that are a result of millions of users clicking on the Phish Alert Button on real phishing emails and allowing our team to analyze the results. [...]

New Deceptive Strains of Payroll Phishing: “Because that’s where the money is…”

By |2018-07-25T10:22:17-05:00July 15th, 2018|Categories: Cyber Security|Tags: , , , , , , , , , , , , , , |

Most readers will probably be familiar with the mythical story of bank robber Willie Sutton who, after being nailed by the cops, was asked why he robbed the bank. His answer (undoubtedly delivered in the most deadpan voice one can imagine): "Because that's where the money is." Although criminals have gone high tech since the [...]

It Saves Your Battery, But Its Social Engineering Steals Your Data

By |2018-06-26T16:55:46-05:00July 1st, 2018|Categories: Android, Google, Cyber Security, Mobile, Social Media|Tags: , , , , , , , , , , , , , , , , , |

Google Play is a walled garden, but the serpents always manage to find their way in.  There is a new snake in the grass with a tempting offer on its forked tongue: an app that "saves the battery" in your mobile device. It begins with a vaguely plausible pop-up: "Samsung clean-up might be required! Your [...]

What Is Angler Phishing And How Do I Avoid Becoming A Victim?

By |2018-06-20T08:18:40-05:00June 15th, 2018|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , |

What is Angler Phishing? Angler phishing is the practice of masquerading as a customer service account on social media, hoping to reach a disgruntled consumer. About 55% of such attacks last year targeted customers of financial institutions, trying to lure victims into handing over access to their personal data or account credentials. How Angler Phishing Works Angler [...]

Chrome Extensions Spreading Through Facebook Caught Stealing Passwords

By |2018-05-16T20:19:42-05:00May 15th, 2018|Categories: phishing, Cyber Security|Tags: , , , , , , , , , , , , , |

Luring users on social media to visit lookalike version of popular websites that pop-up a legitimate-looking Chrome extension installation window is one of the most common modus operandi of cyber-criminals to spread malware. Security researchers are again warning users of a new malware campaign that has been active since at least March this year [...]