phishing

/phishing

Project Warwalk: PII, Social Engineering, and OSINT

Welcome back to the sixth entry of our research project, Project Warwalk. If this is your first time here, hello! To read the other entries related to this series and check out the glossary, click here . This entry to this series marks a distinctive shift when we’re talking about WiFi and specifically SSIDs. The [...]

Tips for Surviving Black Friday, Small Business Saturday, and Cyber Monday

The tips we’re about to share should be top of mind every day not just during the holiday season. Let’s begin with any interesting discovery by Kaspersky Labs. In 2017, Kaspersky Labs released their Black Friday report and one of their findings is that consumers who use their mobile devices are a driving factor of [...]

Google Calendar Phishing and How to Reduce Your Exposure to It

While sitting with one of our clients recently they mentioned to us that they kept getting event invites/notifications on Google Calendar that were phishing attempts or spam. They finally sent us a screenshot and we dug into the matter to learn more. In short, phishing Google Calendar has been going on for months, based on [...]

Sextortion: 12 Tips to Help Protect Yourself

If you have stumbled on this post, you are probably here for one of two reasons. You want to understand what sextortion is because maybe you're unfamiliar with term, or someone threatened to expose some compromising details about you. In this post we are going to talk about things you need to do immediately and [...]

What is domain slamming and 3 tips to help you from falling for it.

Before talking about domain slamming, let’s briefly look at the importance of your domain name, whether you have a personal website/blog, or own a business. Your domain name is how you are identified on the the public Internet. When someone browses to your web site, their computing device needs to know the IP address of [...]

My Dear Beneficiary Very Important Information Regarding Spam

Recently a client asked why they were getting spam in their email and there are many plausible scenarios for why people, in general, receive these types of messages. This article is only going to focus on a couple of these reasons. Data breaches/scraped email addresses Data breaches, or by scraping web content, are a couple [...]

My Dear Beneficiary Very Important Information Regarding Spam

Recently a client asked why they were getting spam in their email and there are many plausible scenarios for why people, in general, receive these types of messages. This article is only going to focus on a couple of these reasons. Data breaches/scraped email addresses Data breaches, or by scraping web content, are a couple [...]

Old spoofing attack presents issues for web browsers

Everyone is susceptible to deception.  Recently, it's come out that web browsers Chrome (Version 57), Firefox, and Opera are not properly displaying ASCII and Unicode characters.  This leaves users vulnerable to IDN homographic attacks according to web developer Xudong Zheng As Zheng explains, homographic attacks use letters from non Latin languages that look similar to [...]

Old spoofing attack presents issues for web browsers

Everyone is susceptible to deception.  Recently, it's come out that web browsers Chrome (Version 57), Firefox, and Opera are not properly displaying ASCII and Unicode characters.  This leaves users vulnerable to IDN homographic attacks according to web developer Xudong Zheng As Zheng explains, homographic attacks use letters from non Latin languages that look similar to [...]