social engineering Tag

Phishing has been a profitable attack vector for criminals for more than 20 years. The reasons for its success are quite diverse. Throughout this blog, we will provide an overview of different types of phishing, the techniques that are used in phishing attempts and how...

When we think of a digital attack, I think many of us go straight to attack campaigns that involve exploiting application or operating system vulnerabilities. Not all attacks involve these, of course. There are plenty of attacks that solely leverage social engineering tactics to undermine...

This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will Rogers summed it up best. He said, “If there are no dogs in Heaven, then when I die, I want to go where they went.” Recently,...

While Microsoft Office 365 does come with some security right out of the box, it isn’t enough to stop phishing attacks. Here are a few recent examples of Office 365 being unable to stop phishing emails: In early August, a massive phishing campaign called PhishPoint...

During the last few months, we’ve been watching an interesting twist in malware analysis. Cybercriminals recently developed a technique where, in some cases, malware can infect a device when the victim simply hovers their mouse over a malicious link. The dangers of clicking on a link...

Authored by:  Alexander Sevtsov and Clemens Kolbitsch Ransomware has become one of the most serious security threats today. Practically every business, public organization (including local governments, healthcare institutions or public transport systems) or private company, and even individuals, are under attack. [caption id="attachment_2593" align="aligncenter" width="696"] Source: Lastline Knowledgebase[/caption] Regardless of...