The Human Touch

Recently, Twitter saw the accounts of some its most famous account holders (Elon Musk, Bill Gates, Barak Obama, Kanye West and more) hacked and used to push out a Bitcoin scam. When all was said and done, the attack generated more than $100,000 in proceeds for the bad guys. The attack was initiated by a 17-year-old from Florida who was able to gain access to Twitter’s systems through social engineering and phishing … an approach which was not technology-b...

Think Before You Click

All of us have the tendency to get in a hurry when doing our jobs, especially when going through the copious amounts of emails that we receive on a daily basis. Whether we are trying to catch up on the emails that accumulated over our vacation, or we are just trying to manage our normal workload, our mouse can occasionally outpace our brain.   With this said, be sure to slow down and evaluate each email carefully before taking action. One bad click can ha...

Phishing Emails – The Single Best Defense

The majority of phishing emails have the objective of stealing your email account password, so that the bad guys can impersonate you and then steal money from you, your company, your customers, or your vendors.   We regularly cover the ways in which we can identify a phishing email (click to review a blog entry on identifying phishing attempts), but there is one sure-fire way to avoid having your account compromised. If you are ever prompted to en...

Zoom Credentials Compromise – What You Should Know

As the world shifted to using video conferencing tools during the pandemic, the widely-used Zoom platform came under fire for multiple security issues. One of these concerns is that 500,000 Zoom account credentials recently became available on the dark web. This account information was not stolen from Zoom, but the bad guys got their hands on credentials stolen from other sites and then tried those username/passwords on Zoom (a technique called “credentia...

2020 Threat Report – Highlights

Webroot, the trusted antivirus provider utilized by NetAscendant, recently released their 2020 Threat Report which includes some interesting and helpful information.Please see the following highlights from this report and tips on how to avoid becoming a victim: Consumer PCs remain nearly twice as likely to get infected as business PCs.With many people working from home and on personal computers during the pandemic, be sure to confirm that your system i...

Avoiding Coronavirus Phishing Scams

As concern increases regarding the coronavirus outbreak, the bad guys are increasing their efforts to part you with your data and/or money. The following article from Consumer Reports does a good job in describing these scams and providing tips:  https://www.consumerreports.org/phishing-vishing/how-to-avoid-coronavirus-phishing-scams/With this said, let’s also review some of the main tips in avoiding a phishing attack: If you are ever...

“There is nothing more deceptive than an obvious [FAX].”

Sir Arthur Conan Doyle actually said “There is nothing more deceptive than an obvious fact.” in one of his Sherlock Holmes stories. In other words, perceived facts can be misleading, and we shouldn’t believe everything we see without thinking it through.This quote is certainly true when it comes to phishing attempts. Bad guys are counting on users acting without thinking. With this said, we are seeing numerous “fax-based” scams which have...

What’s Hot in Phishing?

To clarify upfront, this is not an article on the hottest bass lakes in Texas or what color crankbait is hauling in the lunkers. The fishermen in the audience may have quit reading, but we wanted to take a few minutes to talk about the phishing attacks that we are seeing the most. The two most common at the current time are the gift card scam and the voicemail scam. Please see the following for a refresher on these two surprisingly effective c...

‘Tis the Season … for Scammers

During the 2018 holiday season, U.S. shoppers spent a whopping $126 Billion on online shopping. In addition, charitable giving greatly increases over the holiday season. Since all of these dollars attract cybercriminals like bees to honey, be extra cautious and adhere to the following tips: • Avoid clicking on links in unsolicited emails and be wary of email attachments. • Do not enter your email address and email/network password online as 99% ...

Internet Security – Common Misconceptions

Many misconceptions exist about what constitutes “safety” on the Internet, but don’t believe everything you hear. The bad guys are always looking for an angle, so we cannot become complacent and must always remain vigilant.  With this said, please review these common Internet safety myths: If I see the lock icon, I am safe.Just because you see the lock icon in your browser, do not assume that your connection is secure. Yes, ...