phishing Tag

What is phishing? Phishing is a common and increasingly sophisticated form of cybercrime, designed to lure target individuals into disclosing sensitive information, such as bank details, passwords or other confidential data. The attacks take the form of emails, website content, phone calls or text messages and include...

[et_pb_section bb_built="1" fullwidth="off" specialty="off"][et_pb_row background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] A strong password is your first defence against hackers and cyber criminals. This month is Cyber Security Awareness Month, we will share simple tips on how to create secure password...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] In 2015, we observed an increase of macro-based malware along with the spike in spam volume. The majority of the macro-based attacks often start with spammed messages containing attachments such...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] There are numerous ways to spot a fake email. The list below is not exhaustive but covers most common types of phishing attempts. [/et_pb_text][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] The message contains poor spelling and grammar [/et_pb_text][et_pb_text admin_label="Text"...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] What is Malvertising? [/et_pb_text][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] Malvertising, short for malicious online advertising, is a combination that describes the cybercrime of using advertising on websites to proliferate...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] In some cases, cybercriminals may have managed to gain access to systems belonging to somebody that you know and trust or potentially they have spoofed their address (sending with the...

[et_pb_section admin_label="section" transparent_background="off" allow_player_pause="off" inner_shadow="off" parallax="off" parallax_method="off" padding_mobile="off" make_fullwidth="off" use_custom_width="off" width_unit="on" make_equal="off" use_custom_gutter="off"][et_pb_row admin_label="row" make_fullwidth="off" use_custom_width="off" width_unit="on" use_custom_gutter="off" padding_mobile="on" allow_player_pause="off" parallax="off" parallax_method="off" make_equal="off" parallax_1="off" parallax_method_1="off" column_padding_mobile="on"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] What is Phone Phishing, Voice Phising or Vishing? [/et_pb_text][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff"...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] What is Phishing? [/et_pb_text][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] Phishing is the most popular form of Social Engineering. Via email mainly, this describes when an email is received that...