Tag Archives: phishing

Infographic/Pictogram on Spearphishing

I got this from the RSA website. It illustrates the anatomy of an attack.  

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic/Pictogram on Spearphishing

Smart Farming Vulnerabilities

Smart farming is a real thing, it enables farmers to monitor their crops and gather visual analytics on big data. This allows for farmers to anticipate crop availability and forecast pricing. This data is very valuable to the farmers and costly … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Smart Farming Vulnerabilities

Phishing Outlook Looks Legitimate

When an attacker is using Microsoft Office 365’s Outlook paired with Microsoft Lync, it makes phishing emails look authentic and harder to detect without really checking it out. See graphic below.

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing Outlook Looks Legitimate

MedStar Health

It’s assumed that MedStar Health is a victim of crypto-ransomware as MedStar forced a shutdown of their email and records database yesterday in order to stop the spread of the malware from encrypting more systems. Most operations went back to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on MedStar Health

IRS and Seagate?

The Internal Revenue Service issued an alert on March 1st, 2016, to payroll and human resources professionals to be aware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on IRS and Seagate?

This Guy Asks Hackers to Ruin His Life!

An eye-opening video about the capability of hack attacks, from social engineering to complete digital-life and real life takeover. Not only is the journalist asking people to do it, experts blatantly show how they do it. Please take the time … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on This Guy Asks Hackers to Ruin His Life!

Hackers Hold Hospital Healthcare Data Hostage

Hollywood Presbyterian Medical Center’s data systems have been infected with encrypted ransomware. The hospital says patient care has not been compromised, though the cyber-attack has forced them to revert to paper registrations and medical records and send patients seeking emergency … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hackers Hold Hospital Healthcare Data Hostage

It’s Tax Season ∴ CyberThieves Are Working Full Time!

With most things going electronic, it’s beneficial to be aware of some of the tricks a con-artist would use to get your W-2 and try to claim your tax refund before you have the chance to. One popular method is … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on It’s Tax Season ∴ CyberThieves Are Working Full Time!

Remember the Fappening?

Some time ago, back in 2014, I wrote about the Fappening, when someone hacked a bunch of Apple cloud accounts and stole personal pictures of famous celebrities. Turns out that some of the victims to this hack was due to … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Remember the Fappening?

Social Engineering Fraud Losses Doubled in 2015

Consider the largest breaches of 2015 and realize they weren’t about getting financial data directly. It was all about personal details. Identity theft is a hotter commodity on the dark web, than credit card numbers. Anthem 80 million (Personal Details) Ashley … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Social Engineering Fraud Losses Doubled in 2015