dcsimg

Spear phishing 101: what you need to know

Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means of initiating a breach against individuals and organizations, even in 2020. The tactic is so effective, it has spawned a multitude of sub-methods, including smishing (phishing via SMS), pharming, and the technique du jour for this blog: spear phishing. But first, a quick parable. A … [Read more...]

A week in security (July 8 – 14)

Last week on Malwarebytes Labs, we looked at ways to send your sensitive information in a secure fashion, examined some tactics in incident response land, and explored federal data privacy law. We also looked at how security tools can turn against you, and took a deep dive into the rather fiendish Soft Cell attack. Other cybersecurity news The UK government backs facial recognition tech: The … [Read more...]

The 5 most common types of phishing attack

Phishing is one of the most frustrating threats we face. Most of know what it is and how it works, but we still get caught out.  The scam, which involves criminals sending messages that masquerade as legitimate organisations, targets hundreds of millions of organisations every day. The messages direct recipients to a bogus website that captures their personal information or contain a malicious … [Read more...]

Whaling attacks increased by 200% in 2017

Organisations have a hard enough time preventing phishing attacks, but they are now facing a surge in a subcategory of phishing known as ‘whaling’. According to cyber security provider Smarttech 247, the number of whaling attacks tripled in 2017, with companies of all sizes being targeted. Whaling works in much the same way as phishing, but it is specific to the workplace, with criminals either … [Read more...]

Don’t Get Hit by the Whaler’s Harpoon

What is Whaling? Chances are you’re familiar with the term Phishing, where scammers use social engineering tactics to get users to give up personal information such as financial data, Social Security numbers, or other highly confidential and valuable information. That email you received from the “IRS” asking for your Social Security number? Don’t fall for it! You may have also heard of … [Read more...]