Search Results for "email account hijacking"


  • Onliner Spambot Uses List of 711 Million Email Accounts
    Is your email address one of the 711 million emails that are being used by the Onliner spam-bot?  I checked my email address at Have I Been Pwned and found it on the list.  You can click through the link and see if yours is on the Onliner list, or part of some other breach. Onliner is currently r...
  • What Can I Do With A Hijacked Email Account? Part 2
    On Monday we opened this discussion about hijacked email accounts, and showed some examples of the phishing tricks that attackers use to get you to reveal your email password.  Today we will explore the many useful and profitable exploits that a compromised email account offers a cyber-criminal or ...
  • How Cyber-Attackers Use Your Email Against You
    The easiest way for a cyber-attacker to get into your network is through your email.  This can be accomplished a number of different ways, but a successful exploit may use several of these methods together to gain access to your network and control your computer systems.  The great thing, ...
  • Manual Account Hijacking: When It Gets Personal
    The vast majority of account hijacking attempts are an automated variety running on botnets.  Recently Google released a whitepaper that takes a look at a less common, but more damaging threat – manual account hijacking.  The distinction here is that the affected account is hijacked by a...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Happy Anniversary Edition 45 years ago Cheri became my bride.  Its been a long run, thanks for the many happy years Beware: Fake IRS tax email delivers Emotet malware It’s tax season and scammers are looking to make a qu...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day: IONOS Support Phish Chef’s Special: IRS Notification Phish Also serving: OneNote Phish Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet....
  • Phishing Methodology
    By Bob Weiss I have published 135 episodes of the Friday Phish Fry, and in the nearly three years of analyzing phishing exploits I have come to understand most of the techniques, tactics, and procedures (TTPs) used by the attackers.  This article is going to explain the different approaches used ...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day:  Geek Squad Renewal Phish Chef’s Special:  QuickBooks Phish Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet. You can send phishing sa...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day: Code of Conduct Phish Chef’s Special:  Invoice Phish  Examples of clever phish that made it past my spam filters and into my inbox. Some are send by clients or readers like you, and other reliable sources on the Internet. You can send phishing samples ...
  • Friday Phish Fry
    Phishing Email Alerts Catch of the Day:  FedEx Shipping Phish Chef’s Special:  Bit.ly Link Phish Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet. I would be delighted to accept suspicious phishing examples fr...
Page 2 of 8 12345...»