Email fraud warning: Now hackers want your data as well as your money

Fraudsters are launching phishing campaigns that come in the shape of emails pretending to be from someone within the same organisation as the victim — and the crooks are increasingly targeting data rather than money. Email fraud, particularly business email compromise, hit the headlines when the FBI said this particular form of cybercriminal activity cost victims […]

What is phishing and how to avoid email scams

If you have an email address or own a phone, you’re likely to have been the victim of phishing at one time or another. Phishing is the term applied to kind of electronic communications scam that aims to obtain private information, or to spread harmful malware, via the recipient. The phenomenon takes its name from […]

What are different types of phishing attacks? How to protect yourself against phishing?

From the Nigerian Prince messages to the sophisticated cloned websites which look exactly like original, phishing as a threat vector has come a long way. Phishing has now emerged as the top cyber threat because cybercriminals are using more and more sophisticated methods to fool their victims into divulging critical confidential information. The best way […]

This new trojan malware uses leaked source code of legit software to snoop on you

Hackers are distributing a newly discovered form of trojan malware that offers full access to infected Windows PCs. Dubbed FlawedAmmyy, the malware is built on top of leaked source code for a legitimate app, Version 3 of Ammyy Admin remote desktop software, and enables attackers to secretly snoop on those duped into installing it. The […]

Phishing Via Social Media Up 100 Percent, Now A Preferred Vector

The most interesting trend to surface in Q4 of RiskIQ’s phishing report was a 100 percent increase in phishing campaigns leveraging social media platforms, accounting for 20 percent of the top 10 most phished brands. Phishing actors are always innovating and creating new methods to lure victims into gaining access to their financial information, PII, […]

Hacking operation uses malicious Word documents to target aid organisations

A newly uncovered ‘nation-state level’ cyber espionage operation has targeted humanitarian aid organisations around the globe via the use of backdoors hidden within malicious Word documents. Dubbed Operation Honeybee based on the name of lure documents used during the attacks, the campaign has been discovered by security researchers at security company McAfee Labs after a new variant […]

Millions of Office 365 Accounts Hit with Password Stealers

A new wave of phishing attacks aims to dupe users and steal their passwords by disguising malicious emails as tax-related notifications from the IRS. Barracuda Networks last month flagged a “critical alert” when it detected attack attempts to steal user passwords. This threat lures victims with Microsoft 365 Office files claiming to be tax forms […]

Financial phishing accounts for over 50% of all phishing attacks for the first time

This is the first time since recording phishing attempts that figures have reached over 50 percent, according to an analysis of the financial threat landscape by Kaspersky Lab. Financial phishing attacks are fraudulent messages which link to copycat websites that appear legitimate. They aim to gain users’ credentials for banking and credit accounts, and data […]

New app store subscription phishing emails target Apple users

Representing such a large and diverse percentage of the market, Apple customers are common targets of phishing attempts. Whether they be innovative methods via iOS applications or traditional email phishing attempts, it’s important for customers to remain skeptical of communication asking for sensitive information. A new wave of phishing attempts targeted at Apple customers comes in […]

Which phishing messages have a near 100% click rate?

Training employees to spot phishing emails, messages and phone calls can’t be done just once or once a year if the organization wants to see click rates decrease. For one thing, employees come and go (and change roles) with regularity. Secondly, threats change over time. Thirdly, knowledge and practices that aren’t regularly reinforced will be […]