Oct 12, 2019 | Business, Business Email Compromise, cyberattacks, Cybersecurity, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Sophisticated Email Attacks Against Businesses Are Up Exponentially The top tactic preferred by cybercriminals is the use of what is known as Impersonation fraud or more commonly as Business email compromise (BEC). Since these rarely involve malware, it is...
Sep 27, 2019 | Business, Business Email Compromise, Cell Phone, cell phones, CEO, Cyber breaches, Cybercrime, Email, Employees, Hackers, Hacking, Hacking, iPad, iPhone, Malware, Phishing, Radio Show, Radio_Show, Security, Smart Phone, Tablet
Spearphishing Mobile Devices of Executives Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Sep 23, 2019 | Best Practices, Business, Cyber breaches, cyberattacks, Cybercrime, Email, Hacking, Hacking, industrial espionage, Nationstates, Organized Crime, Phishing, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, scam, Security, Security, spying, Technology
Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Aug 31, 2019 | Applications, Business, cyberattacks, Cybersecurity, Email, Email, Employees, Employees, Hacking, O365, Phishing, Radio Show, Radio_Show, Technology
The number of Users Makes this Company a Hacking Target One of the biggest players in enterprises is Microsoft and because they are so huge they are a target for phishers because if they can compromise a single user they can get access to your entire O365...
Jul 14, 2019 | Business, Cybersecurity, CyberTraining, Email, Email, Employees, Hacking, Radio Show, Radio_Show, Security
Someone’s Phishing for You! Black Hats are out there casting a line for you and hoping to land their “Phish” This type of social engineering relies on a simple human trait – trust. By playing on this trust, they can manipulate you into falling for their...
Dec 15, 2018 | Computers, Cybersecurity, Email, Microsoft, Radio Show, Security
A Bug Left Your Microsoft Account Wide Open To Complete Takeover A series of vulnerabilities has left Microsoft users’ accounts — from your Office documents to your Outlook emails — susceptible to hacking. This one is showing how today’s complex systems can have some...