Ransomware Attacks: Essential Steps for Investigation

Understanding Ransomware Attacks: The Basics Ransomware is a malicious form of software that blocks access to a computer system or files until a sum of money, or ransom, is paid. Its impact on organizations can range from temporary disruption of [...]

Ransomware Attacks: Essential Steps for Investigation2024-10-09T05:29:09-07:00

Are You Phish Bait? Unmasking the Tactics That Target You

Phishing is a common type of social engineering attack that attempts to trick people into revealing confidential information, such as passwords, credit card numbers, or Social Security numbers. Phishing emails are often disguised as legitimate communications from people you [...]

Are You Phish Bait? Unmasking the Tactics That Target You2024-01-09T21:19:38-08:00

What are the Impacts of AI on Cybersecurity?

AI is a double-edged sword in cybersecurity. While it provides powerful tools for defending against cyber threats, it also poses new challenges as cybercriminals adopt AI-driven techniques. AI and Cybersecurity - Potential Threats Automated Attacks: Malicious actors can use AI [...]

What are the Impacts of AI on Cybersecurity?2024-02-07T11:53:28-08:00

Business Email Compromises are Now 23 Percent of Cyber Insurance Claims

If you have Mailworx from Alvaka, or a similar email spam filtering solution, then good for you. If you do internal education and phishing tests of your employees, then double-good! At Alvaka Networks, we have seen a number of business [...]

Business Email Compromises are Now 23 Percent of Cyber Insurance Claims2021-01-27T18:06:26-08:00

Phishing for Your Destruction

A Timely Warning About Fake Communications and Persuasion Methods As many of us have experienced, there are people in the world who want to steal from us, our company or employer. In some cases, they want to pretend to [...]

Phishing for Your Destruction2021-06-28T10:06:16-07:00

A Scary Incident of a $21.5 Million Successful CEO Phishing Fraud

Phishing is a scam usually executed via email or text messaging. The perpetrator usually poses as someone you know and they induce you to send them money. The incident explained below could also be called spear phishing or whaling, in [...]

A Scary Incident of a $21.5 Million Successful CEO Phishing Fraud2019-12-13T12:14:52-08:00

Auto-fill Phishing Attack – This is scary. You better turn off your browser’s auto-fill feature.

There is interesting breaking news from web developer and hacker Viljami Kuosmanen as reported in The Guardian - Browser autofill used to steal personal details in new phishing attack.

 “The phising attack is brutally simple… when a user fills in information in some simple text boxes, such as name and email address, the autofill system, which is intended to avoid tedious repetition of standard information such as your address, will input other profile-based information into any other text boxes – even when those boxes are not visible on the page.

Disabling Autofill in Web Browsers

Google Chrome

1.       At the top right, click on the Settings icon (represented by three vertical dots)....

Auto-fill Phishing Attack – This is scary. You better turn off your browser’s auto-fill feature.2024-04-21T19:39:44-07:00

Don’t go on a phishing trip!

Kevin McDonald guest writes a blog for Dave Berkus' Berkonomics TUESDAY, June 21st, 2016 By Kevin McDonald Phishing, a play on the word “fishing,” is a dangerous form of executive or CEO email fraud, and is negatively impacting individuals and [...]

Don’t go on a phishing trip!2024-10-09T05:03:31-07:00

Ransomware and Phishing Awareness Training for your end-users

If you don’t treat network security as important, don’t expect your users to treat security as important. Irvine, CA - Ransomware and phishing threats are the most prevalent cyber-risk problem facing your organization today. Securing your system is a layered [...]

Ransomware and Phishing Awareness Training for your end-users2019-09-08T21:59:01-07:00

What is Phishing, aka Social Engineering, and How Do I Avoid It?

I recently warned of a very large recent upsurge in ransomware.  Now I must warn you to beware of new successful social engineering exploits.  What is social engineering?

Wikipedia has a good definition:

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

In other words, phishing, the internet term for social engineering scams is simply a way to trick you into doing something so that you reveal vital information like bank account info, tax return info or send money unwittingly to a devious person.

Let me tell you about social engineering exploits in three recent real world examples.  In the first case, City of Hope in Duarte, CA (City of Hope employees fall victim to phishing attack) had three employees targeted by a phishing scam. They unwittingly revealed protected health information (PHI) which by law must be kept confidential. In the other two cases, the loss of data was much more vast. Both Seagate Technologies (Seagate Phish Exposes All Employee W-2’s) and Snapchat (Snapchat falls hook, line & sinker in phishing attack: Employee data leaked after CEO email scam) had an employee get tricked into providing W2 information on all past and current...

What is Phishing, aka Social Engineering, and How Do I Avoid It?2017-09-18T00:27:31-07:00