A week ago, a concerned Naked Security reader shared with us a “send us money or else” email that was a bit different from others he’d received in the past. The claims and the demands followed a predictable theme – one that we call sextortion because of the connection between sexuality and extortion. Simply...
IT Providers are considered high targets and we take this threat very seriously. If we are breached our clients will be the ones victimized.
Nearly half of all social media-related phishing emails imitated LinkedIn messages. This is a trend we are seeing each quarter, likely because there is a perception that these emails appear to be legitimately coming from a professional network.
Pitney Bowes was affected by a malware attack which impacted some systems & disrupted client access to some of our services. We apologize for any disruption to your systems. We are working to restore affected systems. Please visit http://pb.com/systemupdate for updates. (Source Twitter @PitneyBowes).
Effective risk mitigation can fall short from best practice mistakes. Here's how to fix them.
Only 30% knew that starting a URL with https:// means that the information sent to that site is encrypted.
Online crime costs are expected to reach S6 trillion dollars by the year 2021.
Clickjacking is what happens when a user is tricked into clicking something that’s disguised as a different element, thus accidentally revealing confidential information, or even take control.
Ex-AWS employee behind Capital One hack also infiltrated its cloud servers to mine cryptoCourt documents have revealed more details about the alleged hacker’s extensive operationThe former Amazon Web Services employee who allegedly hacked Capital One bank in July has been accused of breaching the bank’s cloud servers to mine cryptocurrency.Paige Thompson –...
RANSOMWARE REPORT Stay informed about the imminent danger of Ransomware in 2019. Response Time is Crucial By the time you realize you've been breached, it's too late. Disaster Recovery Options If Ransomware does penetrate your network, a solid disaster plan is essential. Encryption Detection is Key Ransomware protection looks for...