Phishing

Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
Posts about Phishing
    • Don’t fall for the Prime Day phishing scam

      A phishing attack is when a scammer sends out a mass of emails that look like legitimate emails from such places as a bank telling you to log into your account and offering you a link to do so. Usually they do this under the guise that something is wrong with your account. Instead of sending you to your bank site, the website it sends you to is almost a mirror image of your ba ...

      Greg's Corner- 23 readers -
    • New season for the Netflix phishing scam

      Much like the flu, phishing scams have their own seasons as well. They’ll go away for a while, lay low, then start sending out their legitimate looking emails again. These emails look like they come from legitimate websites and always ask you to update your information. This time around, the phishing emails appear to come from popular video streaming service Netflix.

      Greg's Corner- 18 readers -
  • Twitter Is a Vulnerable Attack Vector: Protect Yourself and Your Customers

    … At this point, you are using social media not only for marketing purposes but also to speak to your customers. But when your customers speak to you are they following proper security measures, or are they using social media inappropriately? And if they are, what are you going to do about it? Furthermore, what are you going to do to prepare your…

    Growmapin Social- 11 readers -
  • The History of Email and Email Design

    … 44 years ago, Raymond Tomlinson was working on ARPANET (the U.S. Government’s precursor to the publicly available Internet), and invented email. It was a pretty big deal because up until that point, messages could only be sent and read on the same computer. This allowed a user and a destination separated by the & symbol. When he showed…

    Douglas Karr/ Marketing Technology Blogin EMail- 25 readers -
  • Hacked ICANN data for sale on black market

    … If you were a user of ICANN’s Centralized Zone Data Service back in 2014 you may wish to think about changing some passwords today. ICANN has confirmed that a bunch of user names and hashed passwords that were stolen in November 2014 have turned up for sale on the black market. The batch reportedly contains credentials for over 8,000 users…

    Kevin Murphy/ DomainIncite- 19 readers -
  • Phishing in new gTLDs up 1,000% but .com still the worst

    … The .com domain is still the runaway leader TLD for phishing, with new gTLDs still being used for a tiny minority of attacks, according to new research. .com domains accounted for 51% of all phishing in 2016, despite only having 48% of the domains in the “general population”, according to the 2017 Phishing Trends & Intelligence Report from…

    Kevin Murphy/ DomainIncite- 26 readers -
  • Don’t pay your fines through Facebook

    … Don’t pay your fines through Facebook Recently in Detroit, a new twist on an old scam has reared its ugly head. People posing as city employees are sending messages to people on Facebook telling victims that they owe court costs to the city. Instead of mailing a check to city hall the victims are informed to wire the money in order to receive…

    Greg's Cornerin Social- 10 readers -
  • ICANN joins anti-phishing group board

    … ICANN’s VP of security has joined the board of directors of the Anti-Phishing Working Group. Dave Piscitello is one of three new APWG board members, arriving as the group expands its board from two people to five. APWG said the expansion “is recognition of the growing complexity and scale of Internet crime today and the challenges…

    Kevin Murphy/ DomainIncite- 34 readers -
  • Unlock Facebook With a Physical Security Key?

    … authentication: Phishing protection: Your login is practically immune to phishing because you don’t have to enter a code yourself and the hardware provides cryptographic proof that it’s in your machine. Interoperable: Security keys that support U2F don’t just work for Facebook accounts. You can use the same key for any supported online account (e.g…

    David Cohen/ AllFacebookin Social Google Facebook- 37 readers -
  • New phishing attack targets GMail

    … New phishing attack targets GMail For those of you who may not know, phishing is a type of scheme where an entity casts a wide net to a number of users in order to obtain the personal information of a few random victims. It’s like fishing but with a ‘ph’ because the internet likes to misspell things. A new phishing attack has appeared…

    Greg's Corner- 22 readers -
  • Beware of fake emails pretending to be from Netflix

    … Beware of fake emails pretending to be from Netflix Internet security experts are saying that there is a new scam happening that purportedly targets Netflix users. In what’s known as a phishing attack, people are receiving emails claiming to be from Netflix saying that they need your personal info to be updated. Of course, the info they’re…

    Greg's Cornerin EMail- 14 readers -
  • Super Mario Scammers

    … but as the saying goes there’s no such thing as a free lunch. Most of these offers are nothing more than phishing attacks that ask you for your personal information with the promise of unlocking the game for free on your iPhone or iPad. Of course that never happens and now you’ve just provided and identity thief with all the information they could ever…

    Greg's Corner- 14 readers -
  • Businesses: Take a Holistic Approach to Cybersecurity

    … security practices. According to Heid, spear phishing is one of the biggest headaches for companies: Targeted spear phishing attacks are one of the most common and effective means of gaining unauthorized access to an enterprise network. Attackers will profile specific individuals within an organization before engaging the targets…

    Inside Facebookin Social- 13 readers -
  • Learn to Identify and Protect Yourself From Phishing Scams (Infographic)

    … of your data. An infographic from Digital Guardian provides a guide for identifying and avoiding phishing attacks. Unlike hacking, phishing is usually a confidence scam, where a cyber criminal will attempt to make users or employees believe they are a legitimate source. This can lead to leaks of personal information, or open vectors for malware…

    AllFacebook- 53 readers -
Get the top posts daily into your mailbox!
More from around the web