Tag Search: phishing
Posted on Wednesday April 26, 2017 | word, security training, security, phishing, office, microsoft, malware, dridex
Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you're an avid Microsoft Word user, here's what you need to know about the bug.
Posted on Monday April 24, 2017 | phishing, malware, homographs, cybersecurity, browsers
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice for how to avoid the newest trend in phishing.
Posted on Friday October 07, 2016 | social engineering, security, phishing, cybersecurity
Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don't have a clue about what is happening. Avoiding it is a matter of training, and we're here to educate you on the subject.
Posted on Wednesday September 21, 2016 | zero day attack, security, ransomware, phishing, patch, malware, cyber attackers
As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you're looking for a list of the industry's most relevant terms, you've come to the right place.
Posted on Thursday August 18, 2016 | tailgating, social engineering, scams, rio olympics, quid pro quo, pretexting, phishing
Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. But spectators aren't the only victims. Without knowing the most common social engineering exploits, your business's data is also at risk. That's why we have compiled four of the most frequently used social engineering scams to help protect you and your business.
Posted on Tuesday January 05, 2016 | trends, tech, smartphones, security, phishing, passwords, google
It seems Google is taking the issue of online security increasingly serious as they have recently unveiled their latest attempt to stem the tide of phishing. Trialing a password-free login option, they also aim to curb the dangers caused by ineffective and over simplified passwords - something that every small and medium sized business needs to be paying attention to. In simple terms, the function uses your smartphone to log in to your Google account - so how will it work?