Search Results for "email account hijacking"


  • Why Would Someone Hijack My Website?
    If you own a small business, you have a website.  Would you be surprised to learn that your site is a top target of cyber-criminals?  Most people believe their business is too small and insignificant to be interesting to attackers, but your website is valuable to them precisely because it is small...
  • When Web Bots Attack
    When web bots attack, what websites are the most likely to targets?  We discussed automated attacks against websites last month.  Here is some new information from Distil Networks about who the main targets have been in the recent past. If your business is included in the following list, you may ...
  • Are Malicious Bots Visiting Your Website?
    Bots are alive, well, and busy on the Internet, making up nearly half of Internet traffic. Bad bots are used by cyber-criminals and cyber attackers to automate harmful exploits and attacks, such as denial of service attacks, crypto-coin mining, data mining, information exfilitration, account hijacki...
  • You Are the Tip of the Spear
    October is Cybersecurity Awareness Month and this week’s theme is Cybersecurity in the Workplace is Everyone’s Business. Has anyone from your company’s IT department asked you to join the cybersecurity staff?  No?  Well consider yourself invited. Cybersecurity has become an criticall...
  • The Google Docs Hoax: What Have We Learned?
    It has been a couple of weeks since the Google Docs hoax spread across the Internet like wildfire.  What have we learned about this exploit? Originally this appeared to be a phishing campaign, but phishing emails are spoofed clever replicas.  These emails were the genuine article, and were sent fr...
  • Should You Use Domain Privacy?
    I will start out by admitting that I hate Domain Privacy.  But I just read a story in Naked Security on February 9th that is causing me to reevaluate my opinion.  It turns out that the new White House press secretary, Sean Spicer, has a personal website at www.seanspicer.com.   The website has ...
  • Cybersecurity Top 10
    As we approach year-end, many small and medium sized business owners and managers are coming to the realization that their best intentions for creating a cybersecurity program in their organization have fallen short.  This was the year, you promised yourself, that we get a handle on computer and ne...
  • 7 Cybersecurity Travel Tips
    As we get into the summer travel season, here are a few recommendations to help you security your smartphones, tablets, and laptops.  Let’s remember that even short trips from home to the coffee shop or library can expose you and your devices to risks. Public WiFi Wireless access points repre...
Page 8 of 8 «...45678