Blog

Apr
25
Apr
12

Does this represent the most dangerous phishing scheme yet?


temp-post-image


Imagine this: While checking your email, suddenly an unexpected but reliable message pops up in your inbox.


"Wow!" you may think to yourself. However, this email might not be what it seems.


Cyber criminals use this scam to lure you into clicking malicious links or providing personal data that could compromise your security. SubdoMailing is as harmful as its name suggests.


What's going on?



Cyber criminals pose as trusted brands to commit phishing attacks that appear legitimate.


So how does Trustedbrand do it? They search the web for subdomains of reputable companies that contain subdomains known as Experience, such as experience.trustsedbrand.com? Experience is actually just an instance of what's ...


Mar
20

Are You Worried That You May Fall for an Illicit Scam?


temp-post-image


Deepfakes have become more sophisticated over time, raising many valid concerns. What exactly constitutes a Deepfake?


Deepfakes refer to videos or images created with artificial intelligence (AI).


Deepfake AI mimics voices and faces to give the impression that people are speaking truthful statements they aren't actually saying.


AI can mimic human behaviour because it has seen so many real-world examples.


Recent events at a multinational company demonstrate just how effective deceptions can be.


Unusual Request



An employee in Hong Kong received an unusual request from their Chief Financial Officer (CFO), located in the UK. In it he/she demanded an urgent transfer of large funds into an offshore acco...


Mar
12

The award for most popular phishing scheme goes to...


temp-post-image


When it comes to safeguarding business data, one thing is certain: Be on guard against phishing emails!


What is Phishing Email? Imagine an unscrupulous person or business wearing sheeps' clothes to attempt to defraud unsuspecting victims with fraudulent messages that appear legitimate but are actually designed to take advantage of people by disguised themselves as legitimate messages, often including malicious links and attachments or requests for sensitive data from unsuspecting recipients. They might appear as emails coming from someone known and trusted.


Knowledge is power, so staying informed is one of the best ways to protect yourself. Here are some of the most popular phishing emails fro...


Dec
14

Forget about "you can't teach an older dog new tricks


temp-post-image


New research has unlocked an unexpected facet of cyber security risks: your younger employees who possess technological proficiency could be your biggest exposure.


Are You Shocked? Let's Get Down to Business


Survey results were alarming: Over 6,500 employees worldwide were polled with an even distribution across demographics.


Study results revealed that younger office workers (those aged 40 or under) are more likely to disregard basic password safety rules and use their birth dates as passwords, while only 19% used this tactic among those over 40!


And it doesn't stop there.


Young workers were more likely to use the same password across multiple devices than any other age group; 38% admitted doing...


Nov
20

Be wary of a new, devious phishing scam


temp-post-imageAnother day, another scam. Here's one that is particularly insidious.


Cyber criminals have evolved, creating increasingly intelligent malware. One such virus even impersonated an established brand to gain entry.


Email from an e-signature service widely utilized.


Email attachments will consist of an empty picture containing empty svg images carefully embedded within an HTML file (please be patient).


Clever malware that bypasses security software.


Your business could be put at risk as the code within this image redirects users to a malicious website.


By simply opening an attachment, it's possible for malware to infiltrate your device or network and put your data at risk of ransomware attacks, leavin...


Categories