Search Results for: phishing
Top 37 Risks Businesses Run with Uncontrolled Internet Usage
No one in IT really wants to be the Internet Police – granted. In fact, the less we know about our colleagues’ web surfing habits, the happier we will probably be. Sometimes there really is such a thing as ‘too …
Web Reputation Can Save You from Online Threats
Reputation is everything in business. A single blemish, a negative report, or a poor review of a product, could bring a company to its knees, affect sales and send a negative message to investors or consumers. Reputation and trust go …
The Art of Social Engineering
Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a …
Generating False Hope with Fake Generators
Another day, another random website offering up freebies that you’d be better off without. This time around, the site in question is located at freeamazingsoftwares(dot)blogspot(dot)com. The free programs include – stop me if you’ve heard this one – RuneScape gold …
Understanding Website Categorization in GFI WebMonitor
GFI WebMonitor is robust web filtering, web monitoring and web security solution, that provides administrators with more than 70 categories of websites from which to choose and provide granular flexibility when applying policies. However, how many of us really understand …
Facebook Profile Rollback Phish
Here’s a phishing scam that lures users with the promise of getting their “old Facebook profile” back. What that means is up for debate – maybe the scammer is harking back to a land of slightly less privacy options, or …
Here’s another thing that’s scary about Shady RAT
A lot of chatter and breathless reporting about Shady RAT. All the makings of an epically awesome story — the US is being taken down by Chinese interlopers to the nastiest degree, installing keyloggers and other badness on US government …
We’re (Auto)whalers on the Moon
I don’t know what it is about this one that sets the Spidey Sense tingling. Maybe it’s the fact it promises to make things all too easy – Vader reference there for anyone keeping score – for the lazy crook. …
When Fans Attack, Facebook Phish and Steamy Logins
Here’s a roundup post with some snippets from the past day or two along with one or two events you may have missed. Last week, you could (in theory) been searching for the country singer Katie Armiger. No, I have …
Google docs phishing
A hazard of cloud-based services is reputation hijacking — using the cover of a legitimate cloud service to do bad things. For example, you can’t block the domain “Google.com”, because it has legitimate purposes. So a network administrator is left …










