Blog

An Introduction to Spear Phishing – Part 2

What the Spear Phisher is After Our last blog examined what a Spear Phishing attack is.  In today’s blog, we examine what the primary targets are: 1. Money, Money, Money and lots of it: While other Phishing based campaigns focus on getting any kind of personal information and data, the Cyber attacker in this case, wants just one ...

Read More

An Introduction to Spear Phishing – Part 1

Introduction to Spear Phishing As we know it today, Phishing has become one of the most commonly used tactics by the Cyber attacker in order to garner personal information and data.  This primarily involves our physical addresses, E-Mail addresses, credit card numbers, banking and other types and kinds of financial information, Social Security numbers, etc. Phishing involves ...

Read More

How to Recover from A Phishing Attack – Part 2

Introduction Our last blog examined the steps that you need to take in order to recover from a Phishing attack. In this one, we can continue with that theme. The Steps Remediation: This is deemed to be one of the most critical phases; as this is where the damage of the Phishing attack will be contained. This ...

Read More

How to Recover from A Phishing Attack – Part 1

Introduction Our last series of blogs closely examined the details of a Spear Phishing Attack. But whoever or whatever the target is, once the damage is done, efforts need to be taken to mitigate the damage, and try to find ways so that these types of attacks don’t happen again. In this series of blogs, we examine ...

Read More

What Do Email Phishing Scams Do? Best Practices for Protecting Your Information

Email Phishing scams are carried out online by tech-savvy con artists and identity theft criminals. They use spam, fake websites constructed to look identical to real sites, email and instant messages to trick you into divulging sensitive information, like bank account passwords and credit card numbers. Once you take the phisher's bait, they can use ...

Read More