The first phishing attacks have been traced back to the mid 1990s with the rise of AOL. Hackers would get fake accounts and pose as AOL employees, instructing users to update their personal and billing data. The result? Stolen information.
What defines a cyber “incident”, and if it happens to your business, how serious is it? These are two prominent questions among businesses of all sizes and industries. These questions, however, are especially vital to answer for small businesses who often lack the staffing, technology, and resources to understand and implement adequate cybersecurity.
Black Friday, Cyber Monday, holiday gifts and New Year's celebrations – these are some of the factors that make November through January the most active online-shopping period of the year.
One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.
Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.
Advanced attacks are out there.
Advanced malware threats are hiding in software applications many of us use daily and trust. So much so that legitimate software can be difficult to distinguish. New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.
Whether you know it or not, cyber criminals see you, the end user, as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself from some of the most common threats. Follow these easy tips to eliminate many of the everyday security threats...
Sometimes, it's the little things that make a big difference.
This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:
In the past 48 hours, security operators have seen a new ‘sextortion’ message begin popping up in client inboxes almost everywhere.
The most frightening part of this message is that it lists a password either in the subject line or the first sentence.
Over the last couple of weeks, we’ve noticed an uptick in phishing emails that are using fake DocuSign sites to attempt to steal credentials to user email accounts.
You may not realize it, but your computer, mobile devices, accounts, and information all have value to cyber criminals.
According to Verizon’s Data Breach Report, 91% of company breaches start with an email.
Knowing how to maintain email security at the user-level will keep you and your company safe.
U.S. warns about phishing attacks on nuclear, energy, aviation, water, and manufacturing industries.
The U.S government issued a rare public warning that sophisticated hackers are targeting energy and industrial firms, the latest sign that cyber attacks present an increasing threat to the power industry and other public infrastructure.
You may not realize it, but you, your company, and your employees are all targets for cyber criminals. Computers, mobile devices, accounts and your information all have tremendous value.
Every Wednesday our engineers take on a new cybersecurity topic as part of our Whiteboard Wednesdays series. At Infogressive we spend a lot of time breaking into our clients’ networks as part of our Penetration Testing services. A major component of our methodology involves social engineering.