Phishing scams are pouring into inboxes in droves. And as the sheer volume of these scams increases, so do the levels of sophistication. Verizon reports that 30% of phishing scam emails get opened by the targeted users, with 12% of those users clicking…
Bank phishing scam phones it in
Many banking customers in Brazil woke up to a rude shock as the security module they installed as instructed turned out to be a trojan. Dubbed Camubot, the Trojan malware proudly sports banking logos and other branding,…
Bank phishing scam phones it in
Many banking customers in Brazil woke up to a rude shock as the security module they installed as instructed turned out to be a trojan. Dubbed Camubot, the Trojan malware proudly sports banking logos and other branding,…
Macs are beautiful machines, in both appearance and performance. The sleek designs, intuitive OS, trend-setting apps, and, yes, the anti-malware security built into the platform, make them among the most cherished items possessed by their owners.
Remember when the internet was fun? These days it seems to be more minefield than playground. Users are treading cautiously and trusting nothing, wondering is this link safe and is that site infected? It’s difficult to enjoy your digital world when wor…
SamSam ransomware is back with a surprising addition
The ransomware strain that locked up the city of Atlanta in March of this year has returned, cybersecurity experts report, but with one mysterious addition. This new variant of the most infamous ran…
Amazon Web Services (AWS) hijacked for 2-hour heist
For two hours on Tuesday, the website MyEtherWallet.com, a cryptocurrency wallet where thousands of users store their Ethereum, was leeched of roughly $150,000. Cybercriminals hacked into the site by…
At this very moment, your inbox is teeming with them. Like an annual migration upriver, phishing emails swim their way into the inboxes of all Americans when tax season rolls around. Every January 1st through April 15th, cybercriminals blitz the public with their most clever deceits. They pose as someone you know or an institution you use, stating in an official-sounding way that “there’s a problem with your account, just click here to clean it up.” That’s their bait. It’s all decoy.
You’ve probably heard countless terms relating to cybersecurity, but here we are going to focus on just one: attack surface. An “attack surface” is simply the number of possible ways an attacker can get into a device or network and extract data. It’s an especially important measurement for SMBs because most think they are too small to be a target, but a quick look at their attack surface shows that it is in fact quite large, increasing their exposure to risk.
Endpoints are an easy target for hackers, so it’s essential that small businesses protect themselves. Connected employees, vulnerable software and weak antivirus all contribute to this being a favorite target of hackers. And, as the list below details, there are many types of cyberattacks that target endpoints, from phishing to malvertising.