SCAM OF THE WEEK: When Cybercriminals Ask for a Manager

SCAM OF THE WEEK: When Cybercriminals Ask for a Manager Customer retention and satisfaction are vital to most organizations’ success. Knowing how important this is, cybercriminals send fake customer complaints in hopes of catching you off guard.  In a new phishing email,...

SCAM OF THE WEEK: Phishing Starts Earlier and Earlier

SCAM OF THE WEEK: Phishing Starts Earlier and Earlier It’s only early November, but you have probably already seen Christmas trees sold in stores. This is a trend known as “seasonal creep” in which retailers start selling seasonal items in advance of the actual season. Did you...

Tech Tip of The Month – 11/2021

Tech Tip Of The Month How to Sign Out Of The Server When Inside The Server Sign Out At End Of Day! Signing Out Versus Disconnecting Disconnect – Clicking the X button on the blue RDP server bar. (This keeps the work that you had up from the previous days) Signing Out...

SCAM OF THE WEEK: Real People in Fake Call Centers

SCAM OF THE WEEK: Real People in Fake Call Centers The newest trend in cybercrime is the use of cybercriminal-controlled call centers to trick you into providing your bank or credit card information. Cybercriminals try to use real people in fake call centers to convince you that...

SCAM OF THE WEEK: Advanced Attacks from APT35

SCAM OF THE WEEK: Advanced Attacks from APT35 A cybercriminal group known as APT35 has been targeting high-profile organizations in government, journalism, higher education, and more. For a more convincing attack, APT35 compromises legitimate websites that work with these...

SCAM OF THE WEEK: Find the Square Root of Verizon

SCAM OF THE WEEK: Find the Square Root of Verizon In a recent scam, cybercriminals impersonated the telecommunications provider, Verizon. The logo for Verizon is the company name, followed by a red asymmetrical “V” that resembles a check mark. Cybercriminals imitated this logo by...

SCAM OF THE WEEK: The Ultimate Data Breach Database

SCAM OF THE WEEK: The Ultimate Data Breach Database With a year full of high-profile data breaches, one cybercriminal has created the ultimate database. The cybercriminal claims that the database contains over 3.8 billion records and is attempting to sell the information on the...

Cyberheist

Cybercrime has gone pro over the last 10 years. Attacks have become much more sophisticated and intense. The bad guys bypass your firewall/antivirus security software and ‘social engineer’ (manipulate) your employees to click on a malicious link or open an infected attachment. A...

SCAM OF THE WEEK: No Time to Phish

SCAM OF THE WEEK: No Time to Phish James Bond is one of the longest-running film series in history. Since fans have been waiting since 2015 for another installment, the new film, No Time to Die, is making headlines. Cybercriminals have wasted no time and are using the film’s...

SCAM OF THE WEEK: Shortened URLs Are a Sneaky Shortcut

SCAM OF THE WEEK: Shortened URLs Are a Sneaky Shortcut Most email clients have filters in place to flag suspicious-looking emails. Unfortunately, cybercriminals always find new ways to bypass these filters. In a new scam, cybercriminals use shortened LinkedIn URLs to sneak into...