The Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) are warning the public about the dangers of “juice jacking.” Juice jacking occurs when someone innocently plugs their phone or mobile device into a compromised USB port that is infected with malicious software. Such malware can allow criminals …
4 Dark Web Threats Businesses Need to Watch
The dark web is constantly evolving to present a thorny ticket of hazards for businesses. The point of origin for many of today’s most nasty and damaging cyberattacks, the dark web is the world’s third-largest economy and unlike many of the world’s industries, constantly growing. Dark web threats Cybersecurity Ventures …
GPT-3 Makes Phishing Scams Like These Worse
Phishing attacks have reached a new high, with cybercriminals favoring various phishing techniques to trap their victims in nasty phishing scams. Hackers use different phishing techniques as a precursor to many devastating cyberattacks like ransomware, business email compromise (BEC), malware and account takeover. As perpetrators use deceiving social engineering lures, …
Malicious Insiders Damage Their Employer Fast
Malicious insider risk is an unpleasant but ongoing situation that every business has to deal with daily. Both current and former employees can intentionally damage a company, and just one disgruntled employee can wreak havoc fast However it happens, malicious insider actions are responsible for an estimated 25% of confirmed …
Three Growing Dark Web Dangers Businesses Face Right Now
Should you still be worried about the dark web? The short answer is yes. The dark web is active and thriving today. It’s actually busier than ever and still growing thanks in part to the rise of the gig economy. How Significant is the Dark Web These Days? The dark …
What Are The Dangers of Business Email Compromise?
What’s the most expensive cyberattack that businesses face today? If you said business email compromise (BEC) you’re right. The FBI IC3 2021 Internet Crime Report showed that BEC packed a powerful punch against U.S. businesses that year. BEC complainants to IC3 suffered $2,395,953,296 in losses in 2021, 28% higher than …
Scanning A QR Code Could Lead To A Cyberscam
When you think of cybercrime, you probably focus on threats that invade your space while you’re actively online. But QR codes—and the smartphones that scan them—make it easy for bad guys to invade your privacy from objects in your offline, real-life world. Posters, flyers, and stickers with QR codes are …
Cybercriminals Exploiting The Ukraine Crisis
We’ve identified two new cyber scams to be mindful of. As you know, many nonprofit organizations are actively raising money for the citizens of Ukraine. Taking advantage of people’s fundamental generosity, online con men have emailed millions of requests to assist Ukrainian refugees, orphans, and the wounded victims of Putin’s …
10 Facts About the Benefits of Security Awareness Training
Are you looking for an affordable, effective way to protect your company from cyberattacks and prevent a data breach? In today’s volatile cyberattack landscape, every business in every industry is at risk of a cyberattack. That means that every business needs to make sure that it’s taking a strong defensive …
Ho-Ho-Hoax!
The Top Five Holiday Cyber Scams The holiday season is when retailers make most of their money. Cybercriminals, too. We’re making a list (and checking it twice) of the most widely used holiday cyber scams. Have a look: Bogus e-cards. Hallmark recently got out of the electronic greeting card business, …