A large-scale phishing attack was uncovered by PIXM, as well as the person who had been carrying out the attacks.As phishing attacks continue to be a go-to for threat actors, one scam found that a user had stolen a million Facebook account credentials over a span of just four months. Anti-phishing company PIXM found that a fake login portal for Facebook was being used as a stand-in for the social network site’s landing page, and that users were entering their account information in an...
The internet never forgets information that we post online - and, as I discovered, old information can come back to haunt you.The internet does not like to forget. Many of us know this, or at least it's something that's in the backs of our minds as we post updates to Facebook, share photos on Instagram, detail little insights into our daily lives on Twitter, and enter our personal data into a variety of other social media platforms and online services. But now I can see that it's...
Timing is everything, and cyber criminals know how to exploit this to demand ransom payments from victims.Businesses in farming and agriculture have been warned that they should be prepared to face an increase in ransomware attacks at critical times – like spring planting or harvest. The alert by the FBI suggests that ransomware gangs see farming and agriculture as a lucrative target where victims could be more willing to pay a ransom for a decryption key because of the...
Cyber criminals want usernames, passwords and other personal information - don't let them have it.LinkedIn users are being urged to watch out for suspicious emails because the professional networking website is one of the most popular brands targeted by cyber criminals in phishing attacks.According to cybersecurity researchers at Check Point, who analysed phishing emails sent during the first three months of this year, over half of all phishing attacks (52%) attempted to leverage...
Buzz, buzz, burnout: Constant notifications are ruining your productivity. Here's what to do about itPut it in an email. Better yet, don't.How many times a day does your work get interrupted by an email, Slack message or impromptu (and pointless) meeting? If you're a typical knowledge worker, the answer is likely 'quite a few'.Getting side-tracked is one thing, but new research suggests that the constant pings and rings we receive throughout the workday are having a profound...
You will agree that spam is the scourge of the business community. Millions of dollars are being spent in the protection of employees from becoming infected with rouge emails.While the text of an email is analysed, the Internet address it came from is checked on several “black list” databases, the structure and form of the email is also examined to check its validity.However, there is a much simpler test that your outbound email server is failing when sending emails. The problem is...
Ransomware tries to deletes files and render the system unusable.LokiLocker, a relatively new form of ransomware, uses the standard extortion-through-encryption racket but also incorporates disk-wiper functionality. Double extortion became a hit last year, when ransomware gangs started stealing files before encrypting them to threaten victims with a sensitive data leak if they didn't pay up. BlackBerry Threat Intelligence is now warning that LokiLock, first seen in August...
We use smartphones for almost everything - cyber criminals know this and are looking to exploit it.There's been a big rise in phishing attacks designed to specifically target smartphones as cyber criminals look to exploit our increased reliance on these tiny screens.Previously, many phishing websites were device agnostic, set up to steal usernames and passwords regardless of whether the user was clicking the link from a computer or mobile. But cybersecurity researchers at Zimperium...
Editor - While this article is a subset of a much larger evaluation of the top 10 anti-virus products it is noteworthy that the cloud service we provide your business, Avast Business Security (Avast Business Hub | Layered IT Security Platform), is among the best of breed internet security platforms.Antivirus software protects your data against cybercriminals, ransomware and malware. Compare the best software now.It’s hard, if not darn near impossible, to have a business in the modern...
Burnout might be the most critical cybersecurity risk facing organizations in 2022. So, how do we tackle it?Burnout has become endemic in the tech industry.With the number of data breaches in 2021 soaring past that of 2020, there is even more pressure on security teams to keep businesses secure in 2022. But at a time when strength and resilience have never been more important, burnout, low staff morale and high employee turnover could put businesses on the backfoot when attempting to...
Trouble logging in? Simply enter your email address OR username in order to reset your password.
For faster and more reliable delivery, add support@netech.biz to your trusted senders list in your email software.