Imposter Retailers Outnumber Legitimate Ones

Imposter Retailers Outnumber Legitimate Ones

Imposter Retailers Outnumber Legitimate Ones   Are you ready for the extreme online shopping season!  While you can purchase items online anytime, holiday e-commerce sales reached $126 billion last year with Cyber Monday online purchases generating $7.9 billion...
Don’t Take The Bait – Fake Sexual Harassment Claims

Don’t Take The Bait – Fake Sexual Harassment Claims

Don’t Take The Bait – Fake Sexual Harassment Claims Scammers are phishing employees of large corporations using fake US EEOC sexual harrassment complaints to offload trojan payloads of Trickbot malware onto corporate computers which direct them to hand over...
Can You Detect A Phishing Attempt?

Can You Detect A Phishing Attempt?

Can You Detect A Phishing Attempt?   Cybercriminals are getting better at crafting believable and sophisticated ilephishing emails that are undetectable from legitimate emails. Do you know how to spot them?  If you suspect that an email is not legitimate you can...
Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program

Vulnerability in Popular Anti-Virus Program   McAfee anti-virus software has a very serious vulnerability in its code execution.  No matter what edition of McAfee software you are using because all editions are vulnerable. The vulnerability allows malware to...

Bots Losing Panache as Cybercriminals Hire In Third World

Bots Losing Panache as Cybercriminals Hire In Third World   As our detection methods and tools improve, cybercriminals are changing tactics by employing workers from third world countries to steal credentials and money through phishing. It seems we are seeing a...
Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems?  They use many tactics but on of the easiest is through the use of compromised credentials.  The problems is that these are real valid credentials...