Technology Advice for Small Businesses

Watch out! These social engineering tricks could fool anyone

While it’s easy to blame cyberattacks on sophisticated hacking, the truth is that many attackers rely on social engineering — a craft of deception designed to manipulate people into giving up sensitive information or access. The scary part? It’s not just high-tech companies that get targeted, it’s all of us. Here’s a breakdown of the… Continue reading Watch out! These social engineering tricks could fool anyone

Think like a scammer to spot social engineering tricks

Ever wondered how scammers manage to trick so many people? It’s because they’re masters of persuasion. While their methods may vary, social engineering tactics all focus on one thing: manipulating human behavior to steal personal data or corporate secrets. Here are some of their most-used tricks — because knowing their game is the first step… Continue reading Think like a scammer to spot social engineering tricks

The most common social engineering tactics you need to know about

Social engineering is a type of attack where scammers take advantage of trust to steal personal information, money, or access. It’s alarmingly effective, and methods are only getting more sophisticated. To help you recognize these scams, we’ve compiled a list of the most common social engineering tactics. Phishing Phishing is one of the most well-known… Continue reading The most common social engineering tactics you need to know about

New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that’s even more difficult to identify. Here’s everything you need to know. What makes it different from other scams? The new threat… Continue reading New phishing scam targets Office 365 users

Office 365 users face new phishing scam

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on. What makes it different from… Continue reading Office 365 users face new phishing scam

Office 365 threat comes with new techniques

If you’re using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users’ credentials and attack organizations internally. Get yourself informed and read on. What makes it different from other scams? The new threat comes in the form of spear phishing,… Continue reading Office 365 threat comes with new techniques

Russian hackers target Mac OS X users

While plenty of malware target Windows and Android operating systems, Apple products also get some unwanted attention from cybercriminals. In February, Fancy Bear, the Russian hacking group accused of leaking information from the US Democratic National Committee, have created advanced malware for Macs and iOS backups. Here’s how the exploit works. According to antivirus provider… Continue reading Russian hackers target Mac OS X users

US election hackers develop new Mac malware

A new strain of malware is attacking Macs and iOS backups. Researchers have discovered that the malware was concocted by the same Russian-backed cybercriminals who hacked the US Democratic National Committee during the 2016 presidential election. Read on to find out what the malware does and how your business can defend against it. According to… Continue reading US election hackers develop new Mac malware

New Mac malware linked to DNC hacking group

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks. If you own a… Continue reading New Mac malware linked to DNC hacking group

Spear phishing defined

There are numerous ways business security systems can be compromised. A common way is phishing – tricking people into giving up important information via email. Original phishing methods are now well known, and increasingly less effective. So hackers have become more skilled and have adapted their phishing methods into a new form of catching people… Continue reading Spear phishing defined