Phone Call And Text Phishing Scams Are On The Rise

For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on their guard against them. Naturally, this prompts scammers to change their tactics, switching things up a bit to catch people by surprise. In this case, according to recent …

New Phishing Emails Trick Users With Convincing Security Credentials

Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year (2020). When targeted by this attack, a user will get an email containing a braded document containing the name of a legitimate cybersecurity provider. The name of a …

New Android Malware Can Get Past Two-Factor Authentication

Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number of online accounts as a two-factor authentication layer. Google launched the service as an alternative to SMS-based one-time pass codes. While SMS-based codes are better than nothing, they …

Emails Pretending To Be Secret Admirers Could Be Ransomware

Nemty Ransomware isn’t an especially well-known threat, but it’s dangerous and should not be discounted. Recently, researchers have discovered an ongoing spam-email driven campaign that’s attempting to spread the ransomware far and wide. An unknown group of hackers are sending out what appear to be love letters from secret admirers in a broad pattern. They are probably simply using email …

Dangerous New Trojan Can Infect Systems Through Wifi

If you’re not already familiar with the Emotet trojan, it deserves a special spot on your radar. It’s one of the most dangerous forms of malware in the world today. Their success is thanks to the fact that its creators have worked hard and diligently to keep it upgraded by bolting on a variety of modules that enhance its capabilities …

Financial Organizations Beware Of Documents Asking To Enable Content

If you work in the financial sector, be advised that there’s a large scale botnet-driven malware campaign underway. It has been targeting firms in both the US and the UK. The malware at the heart of the campaign is Emotet, which began life as a banking trojan, but it has morphed into something quite different in recent times. It’s now …

New Ransomware Leaks Confidential Data To Public

There’s a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won’t pay, their data that was stolen and encrypted is being published for all to see. KrebsOnSecurity recently identified a website associated with the creators of the Maze ransomware strain that did exactly that. The introductory …

New Hacking Method Looks Like A Locked Computer

Scammers have breathed new life into an old scam. For years, the old ‘Law Enforcement Lock’ trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works like this: Scammers will redirect users using the Chrome web browser to sites that host a full-screen image of a Windows 10 desktop with a notice that appears …

The End Of Windows 7 Support Is Almost Here

Do you still have a few machines in your company that are running Windows 7? If so, be aware that Microsoft is formally ending Windows 7 support in a matter of weeks. January 14, 2020 is the end of the line. After that, you will have the option to pay for extended security updates for up to three additional years. …

Ransomware Uses New Method To Get Past Antivirus Programs

Researchers at SophosLabs have discovered a new threat to be on the alert for.  A variant of the Snatch ransomware has been spotted in the wild. It features an innovative means of getting around whatever antivirus software you may be using to defend yourself. Disguised as a backup utility, when the malware is installed, it forces the Windows PC it’s …