How to Save a Billion Dollars
In my last blog, I examined the state of cybercrime, fraud, and the losses associated with it. It was also in that blog that I brought up a particular threat that has caused more than $1 billion dollars in losses last year and shows no signs of slowing down. So, what is this increasingly expensive a…
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy. Time will tell whether we see such romanticized stories of dashing rogues based on this new golden age of crimi…
Email – From Novelty to Nefarious
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at times a nuisance, and now, to downright nefarious. “You’ve got mail” has somehow turned into “You’ve got malware.” Email has become and remains…
Your money or your life: Digital extortion scams
There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…
Bitcoin Bomb Scare Associated with Sextortion Scammers
Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities, schools and news outlets, among others. The attackers distributed malicious emails claiming to have placed some type of explosive materials in the recip…
You’ve Got (Compromised) Mail!
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with BEC. It’s happening all the time, in your company, right now. People are getting emails that look official, from a realistic company ema…
Don’t Feed the Phish: Implementing DMARC
The Challenge of implementing SPF and DKIM It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not been widely adopted. However, organizations must take advantage of them to tackle two of the most pressing email securi…
4 Ways Collaborative Technology Can Lead to Happier Bank Employees
In established companies, people are the biggest cost—as well as the biggest asset. As banks compete for the best talent, many are realizing they need to re-examine the fundamentals of how they operate. Even traditional financial institutions built on top-down process and authority are lookin…
Attackers Evolve Tactics to Infiltrate Your Network via Email
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…
1