Phishing attacks

Chrome Scrolling Bug May Expose Users To Convincing Phishing Attacks

Security conscious users are still wary of using mobile banking apps, for the very reason they cannot clearly determine if the bank app connects their online banking account to the bank’s servers in an encrypted fashion. The usual verification of a TLS connection is by checking the address bar of the web browser, it provides

[ Read More ]

With FIDO2, Android Looks To Leave Password Behind

So now Android password is going to be something of the past, just like how we discarded the floppy disk. Google’s and the Fast Identity Online Alliance confirmed on Monday that Android is now FIDO2-certified. The certification was unveiled at Mobile World Congress in Barcelona, Spain. This means that devices can use fingerprints and security

[ Read More ]

Cyber Security Is A Culture That Needs To Be Practiced

The biggest weakness of security breaches are the people, but at the same time, they can also be your organization’s biggest defence. The massive telecom data breach, stolen credentials, data compromised are some of the daily issues that we see these days. All of these major breaches resulted from mistakes of individuals. Despite years of

[ Read More ]

SMS Phishing Attempts Against DBS Customers Rampant In the Wild

Development Bank of Singapore and the Singapore Police have issued a warning to the public that a specifically crafted phishing SMS message are spreading, providing users a link that will steal their username and passwords for their DBS online account. Sample messages below: DBS instructed their customers never fall for such scams, especially those messages

[ Read More ]

How to Ensure Protection Against Phishing Attacks

In today’s world, everyone needs to understand the dangers of phishing attacks. Every single individual who uses the internet in one way or the other needs to know how to ensure protection against phishing attacks. What is Phishing? Almost every one of us is targeted by phishing attacks regularly. Phishing attacks comprise sending fraudulent communication,

[ Read More ]

Phone Call-Based Spear Phishing: Bank of America Alerted

The Better Business Bureau has warned banks, especially Bank of America and their depositors/creditors to be alert of a new phishing attack using a newer social engineering technique. Some victims of the new phishing attack suddenly realized that their bank accounts were totally wiped-out of funds, even without remembering if she gave her banking information

[ Read More ]

How to Protect Mid-Tier Enterprises from Cyberattacks in 2019

The new year has begun; here comes another New Year Special from The Threat Report. Today, we take a look at how mid-tier enterprises can protect themselves from all kinds of cyberattacks- known as well as unknown ones. 2018 saw mid-tier enterprises facing lots of cybersecurity challenges, with hackers seeking to exploit all kinds of

[ Read More ]

Netflix Users Warned About Holiday Season Phishing

Netflix is a major player in the Internet today, in the business of streaming videos it is very dominant, in the first quarter of 2018 alone, they successfully grew with 7.5 million more subscribers. It is very influential on how people consume media these days, especially the streaming service company also started producing their own

[ Read More ]

How To Keep Employees Alert Through A Phishing Simulation

As a business owner, you can teach employees all day long with tech guides or links to YouTube videos, but nothing educates an individual quite like submerging them in the reality of a dangerous situation. That’s the aim of a phishing simulation, to expose employees to a realistic scenario where they can learn from their

[ Read More ]

Is That Really You? Phishing Hacks Reach New Heights

Way back in 1792, King Gustav III of Sweden was assassinated while attending a costume party—or “masquerade ball”—in Stockholm. How convenient for the murderer, who could wear any disguise and not be observed after the fact. While those days of anonymity are long gone, it is still possible for malicious hackers to masquerade behind false

[ Read More ]