Beware of Scammers Exploiting Recent Events

It seems that every new event brings out a crop of scammers ready to exploit the gullible.  Several recent scams are using the Equifax breach settlement, and the recent mass shootings in El Paso and Dayton to extract money from or deliver malware to their victims.

First, from KnowBe4, we have the details of several scams taking advantage of people attempting to get the $125 settlement payment they may be owed as a result of the Equifax ...

Continue Reading →
0

Federal Trade Commission Fines Equifax and Facebook

Hot on the heals on each other, Equifax and Facebook have each settled for large fines in unrelated privacy and data breach cases. All I can say is “about time” and “is that all?”

The FTC has fined Facebook $5 billion for data misuse and other issues related to Cambridge Analytica, the European GDPR, the last US Presidential Elections, and the Brexit campaign.  ...

Continue Reading →
1

Guest Post – Accreditation vs. Certification vs. Registration in the ISO world

Things with ISO standards can get really complicated: there are many ISO management standards – the most popular ones are ISO 9001, ISO 14001, ISO 27001, ISO 22301, ISO 20000, etc. – and there are a multitude of ways to get accredited/certified/registered related to those standards. But, that’s not all – there is a difference if you want to certify your company, or if you want to certify as an individual.

So, ...

Continue Reading →
0

Lateral Phishing – A New Threat to Business Email

Phishing is getting better and harder to detect.  One new trend is using hijacked business email accounts to pivot further into a business, by using the built in trust of the company’s email domain to send phishing emails that appear to come from coworkers.  These phishing emails from trusted sources are used to hijack other email accounts in the same company.  This ...

Continue Reading →
0

Don’t Get Emotional!

Social engineers have many tricks up their sleeves, and we have covered many of them in previous articles.  The biggest trick is phishing emails, of course, coupled with replica landing pages on hijacked websites.  Other methods include phone calls, such as fake tech support calls.  There are texting hoaxes, called smishing.  There are fake, cloned, or hijacked Facebook, LinkedIn, Twitter, and Instagram ...

Continue Reading →
0
Page 35 of 107 «...1020303334353637...»