phishing: SEO Poisoning: Train Employees, Watch Your Search Results - 05/10/23 11:27 AM
SEO poisoning is a new tactic that scammers use to steal credentials. It can be difficult to detect, and it can harm the reputation of your business if scammers attempt to spoof your identity.
What Is SEO Poisoning?SEO poisoning is a type of phishing attack. Cyber criminals create a fake version of a website or a landing page, then use search engine optimization (SEO) techniques to get it to rank highly in online searches.
This technique emerged for a simple reason: cyber security employee training teaches workers to never click on links in texts or emails. Because that training has had some success, … (5 comments)

phishing: Prevent Apple ID Phishing Scams - 11/01/22 01:04 PM
Apple owners have noticed something very weird: they are becoming victims of a scam using Apple IDs. Once they give up the IDs, scammers can sometimes get access to their Apple account. Here’s how it works: People get a text that says their Apple ID is going to expire, and they are asked to click a link. When they do, the scam occurs because they unknowingly give up their ID and password to a scammer. It’s not rocket science, but it’s an easy and smart scam.
There are some ways to determine if a message is a scam. First, your Apple ID … (13 comments)

phishing: SIM Swapping: What You Need to Know - 12/18/19 08:54 AM
Have you heard of SIM swapping? It’s a new trick that hackers are using to get money and mess up your life.
What is SIM Swapping?
So, what is SIM swapping? It’s when a hacker tricks your cell phone company into thinking that you have activated your SIM card on another phone. In other words, the hackers are taking your phone number and then associating it with a different SIM card. If the switch is a success, your device will be deactivated, and all of your phones, texts, data, and more will come to the hacker. This means, of course, that the hacker … (0 comments)

phishing: Beautiful Buxom Brunette Lures Boxer to His Death - 11/09/18 07:07 AM
Eddie Leal, 23, was an up-and-coming professional boxer who gave free boxing lessons in his garage to down-and-out neighborhood teens. He was a good guy. And like most young men, was looking for a girlfriend.
One day he saw that a young woman, Rebecca Santhiago, was asking for a friend request on his Facebook page.
The brunette bombshell with fashion model looks said she was 21, liked to party and was attending college.
What Eddie did: He accepted the friend request.
What Eddie should have done: right-clicked on the profile image and then selected off the drop-down menu, “Search Google for image.” He would have … (3 comments)

phishing: Bitcoin Scams Up the Ying Yang - 10/02/18 07:28 AM
If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following:
Fake Bitcoin Exchanges
You have to use a Bitcoin exchange if you want to buy or sell Bitcoins, but not all of them are legitimate. Instead, many of them are created for the sole purpose of taking people’s money. Only use well-known exchanges.
Ponzi Schemes
Bitcoins are not exempt from Ponzi schemes, and you have to look out for these. These are like pyramid schemes, and you … (3 comments)

phishing: Be aware of all these Confidence Crime - 07/26/18 07:40 AM
Criminals have a reliance on tricking victims to get access to account information, like passwords. This is known as social engineering, and is also called a “confidence crime.” These come in many forms:
Do Not Take the Bait of These Phishermen
A phishing email that targets a specific person is known as spear-phishing. A spear-phishing email looks like an email that might come from a legitimate company to a specific person. For example, a thief might send a fake email to a company’s employee who handles money or IT. It looks like the email is from the CEO of the company, and … (14 comments)

phishing: Are Your Employees Putting Your Company at Risk? Find Out! - 05/17/18 08:08 AM
Even if you have the best security on your computer network, you might have noticed that you still seem to get hacked…or worse. Ask Equifax. Why is this happening? It’s probably because a member of your staff has made it easy for cyber criminals to get inside. It’s really important that you find out who this person is, and keep in mind…it might be more than just one. And it may not even involve security technology.
Part of the problem here, is that employees who “open the door” for these criminals probably don’t even realize they are doing it. These criminals are … (5 comments)

phishing: Is Your Small Business Staff Trained in Security Awareness? - 02/15/18 07:11 AM
The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks the link in the email. What she doesn’t … (2 comments)

phishing: 10 Surefire Staff Security Awareness Techniques - 01/18/18 07:33 AM
Think about how great this would be: Imagine that all of your company data is safe from hackers. Your hardware is totally safe and secure. You have IT specialists at your disposal at all times and have a constant flow of cash to pay them.
Unfortunately, this is a fantasy for most of us. No matter how secure we think our network is or how much we pay our IT people, there is always a chance for a data breach. Does this mean we should stop the fight, though? No way.
Instead of throwing in the towel, it’s very important that you start … (8 comments)

phishing: Top 10 Tips for Securing Your Mobile Devices and Sensitive Client Data - 01/11/18 06:30 AM
Do you have employees who bring mobile phones to work and use those devices on the corporate network? Do they store company data on these “Bring Your Own Devices (BYOD)”?? Does your company have a policy in place for this?
First, the moment a person brings in their personal phone to work, there is a fusion of personal and business tasks that occur. And, equally as bad, company issued devices are used for personal use as much, if not more than the employees own devices. Not sure you believe this? Here are some stats:
A recent survey asked 2,000 office workers about their … (4 comments)

phishing: The Best Gmail Phishing Scam Ever! - 05/24/17 05:01 AM
If you use Gmail, pay attention! Security experts have announced that there is a very effective phishing scam out there, and you are a target. This scam, which has only been growing over the past couple of months, is also hitting other email providers, too. However, it’s quite difficult to detect.
According to researchers at WordFence, who make a security tool for WordPress, this is a pretty serious attack and can have quite an impact, even for those who are up on security.
Here’s how it works:
You get an email from someone you trust…like a friend or family member or Google. The email, … (7 comments)

phishing: Phishing is Getting Fishier - 05/02/17 04:50 AM
If you are like most of us, you have undoubtedly received an email that has asked you to click on a link. Did you click it? If you did, you are like 99% of internet users because clicking links in normal. But in some situations you may have found that the link took you to a new or maybe spoofed website where you might be asked to log in. If you ever did this, you may have been the victim of a likely phishing attack, and these attacks are getting fishier all of the time.
A What? Phish? Fish?
It’s called a phishing … (5 comments)

phishing: Top 3 Social Engineering Scams - 01/12/17 05:52 AM
Think about hackers breaking into accounts. If you think they need top-notch computer skills, you would be wrong. These days, instead of requiring skills behind a keyboard, hackers generally rely on strategy…specifically a strategy called social engineering. This means that hackers don’t have to be technical, but they DO have to be clever and crafty because they are essentially taking advantage of people and “tricking” them into giving information.
There are four main ways that hackers use social engineering:
Phishing – where hackers use email tricks to get account information Vishing – similar to phishing, but through voice over the phone Impersonation … (23 comments)

phishing: Oh No, iOS Hacked by NSO - 12/22/16 06:25 AM
Recently, says a report at wired.com, it’s been unveiled that the obscure Israel-based NSO Group has been selling spyware delivered to smartphones through vulnerabilities in Apple’s iOS operating system.
“Pegasus” spyware can put a surveillance out on nearly everything including keystrokes, e-mails, video feeds and phone calls. Apple says that the three vulnerabilities with this spyware (“Trident”) have been patched.
In short, NSO Group’s spyware has been reverse engineered for the first time—achieved by the security research firm Lookout, which discovered Pegasus. Also getting credit for the discovery is Citizen Lab.
Ahmed Mansoor, a well-known human rights activist with a history of being … (5 comments)

phishing: Be aware of all these Confidence Crimes - 08/09/16 12:00 AM
Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms.
A type of phishing e-mail where the criminal targets someone specific is called spearphishing. The spearphishing e-mail will look very much like the typical company e-mail that the real person uses. Example: The thief sends a trick e-mail (phishing) to a company employee he found on LinkedIn, making it appear to be from the company’s CEO or some other higher-up. The “CEO” requests sensitive … (4 comments)

phishing: Phishing attacks Two-Factor Authentication - 07/28/16 12:14 AM
Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.
How a hacker circumvents two-factor authentication:
First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile. Or sends a preliminary phishing e-mail tricking the recipient into revealing login credentials for an account, such as a bank account. The next phase is to send out a text message appearing to be from the recipient’s bank (or PayPal, Facebook, etc.). This message tells the recipient that their account is about to … (1 comments)

phishing: Security Appreciation lacking - 04/19/16 12:26 AM
What’s it gonna take for companies to crack down on their cybersecurity? What’s holding them back? Why do we keep hearing about one company data breach after another?
Well, there’s just not enough IT talent going around. The irony is that most company higher-ups admit that cybersecurity is very important and can even name specific situations that could compromise security, such as
having multiple vendors vs. only a single vendor; not having quality-level encryption in place; allowing employees to bring their own mobile devices to work and use them there for business; and having employees use cloud services for business.
Many even admit that … (0 comments)

phishing: Look out for Shipping E-mail Phishing Scams - 04/13/16 12:13 AM
Stop clicking on e-mails about your package delivery! Scam, scam, scam! Look, it’s simple:
Scammers are also pretending to be from the DHL and FedEx shipping companies, not just UPS. Crooks know that at any given time, thousands and thousands of U.S. people are waiting for a package delivery. So these cyber thieves send out mass e-mails by the millions, knowing that they will reach a lot of people who are expecting a package. The subject line of these e-mails says something about “your delivery” or “your shipment” that lures the recipient into opening the e-mail. Usually, the message is that … (1 comments)

phishing: Protect Yourself from Phishing - 03/21/16 11:53 PM
Everyone has received very obvious “phishing” e-mails: Messages in your in-box that have outrageous subject lines like “Your Account Will Be Suspended,” or, “You Won!”
While some phishing attacks are obvious, others look harmless, such as those in a person’s workplace in-box, seemingly from their company’s higher-ups.
Researchers point out that an e-mail may appear to come from the company’s HR department, for example. E-mails with an “urgent email password change request” had a 28% click rate, Wombat security reported.
Phishing victims act too quickly.
In the workplace, instead of phoning or texting the HR department about this password reset, or walking over to the … (3 comments)

phishing: How to recycle Old Devices - 01/20/16 09:58 PM
When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.
Your discarded smartphone, laptop or what-have-you contains a goldmine for thieves—because the device’s memory card and hard drive contain valuable information about you.
Maybe your Social Security number is in there somewhere, along with credit card information, checking account numbers, passwords…the whole kit and caboodle. And thieves know how to extract this sensitive data.
Even if you sell your device, don’t assume … (4 comments)

 
Robert Siciliano, Realty Security and Identity Theft Expert Speaker (IDTheftSecurity.com Inc)

Robert Siciliano

Realty Security and Identity Theft Expert Speaker

Boston, MA

More about me…

IDTheftSecurity.com Inc

Address: PO Box 15145, Boston, MA, 02215

Office: (617) 329-1182



Listings

Links

Archives

RSS 2.0 Feed for this blog