There may be no feeling less comfortable in modern life than the moment you panic about clicking on a link that appears to activate something very bad on your device. The five stages of grief follow in a few brief seconds: Anger (How could I be so stupid?) Denial (Maybe it’s nothing…) Bargaining (I promise [...]
Over 90% of all network breaches are caused by, or include, a phishing attack. What can you do to protect your organization? We recommend that you start with technical measures like our email security suite, but that’s not the only step you should take. No system is 100% effective and your employees can also put [...]
A Ransomware attack features a hacker installing malware on your device that either encrypts your data or locks you out. In large-scale attacks, whole corporate networks and data repositories can be held up for ransom. The attacker extorts money from the victim in exchange for unlocking their data or device. Ransomware is a serious, growing [...]
One of the more irritating aspects of being hacked is dealing with the attacker’s sense of humor. It’s not enough for a malicious actor to steal your data or ruin your IT assets. If it’s not something dumb, like malware named after Los Pollos Hermanos (The Chickens’ Brothers), a restaurant from TV’s “Breaking Bad,” it’s [...]
The proliferation of social media and cloud based tools in everyone’s business and personal lives means that an ever-increasing percentage of your inbox is filled with emails that were generated from these disparate platforms. In addition to emails from Linkedin, Facebook, and Twitter, many people receive a steady stream of notifications from project management tools, [...]
New Phishing Scheme Detected Vade Retro detected on May 30th what we believe is an entirely new type of phishing scheme: QR codes embedded in an email that lead unwary users to a phishing site that logs their credentials. So far, we have only seen this phishing scheme on email servers in France, but we [...]
The distributed, virtual nature of e-commerce gives exceptionally good cover for spear phishing hackers.
How the concept of security perimeters in InfoSec applies to phishing and spear phishing attacks.
Spear phishing is deadly, from a security perspective. With the stakes so high, see how the use of heuristics can help to assess whether an email is a spear phishing attack or just another harmless work-related communication.
The rise of social media has paralleled the emergence of phishing as a serious security threat to the enterprise. The two trends are also connected.