Snail Mail Phish CD Sent to Gov. from China!

So, we heard it’s in our great interest not to trust emails from unknown senders that prompt us to click on a link or open an attachment.  We are aware that sometimes devious people will try using phish tactics on phone calls to obtain personal information. But even this one caught us off guard — A snail mail phish?! And this isn’t your typical candy drop. Instead of a USB, a compact disc (CD) was used for these attacks.Continue Reading…

New Hacker Tool: RAT Parasite HTTP

This brand-new RAT represents the latest escalation in an ongoing malware arms race that extends even to commodity malware. Researchers are tracking a remote access trojan (RAT) on underground markets that, so far, has only been attributed to one small malicious email campaign. However, the RAT, dubbed Parasite HTTP by the Proofpoint researchers that discovered it, has an impressive list of sophisticated features – raising concerns over future attacks.

Continue Reading…

Protect Your Business From Ransomware Attacks!

Ransomware attacks are the fastest growing malware threats. On average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Ransomware, a type of malicious software that infects and restricts access to a computer until a ransom is paid, affects businesses of all sizes. The good news is that there are best practices you can adopt to protect your business.Continue Reading…

Page 8 of 70« First...678910...203040...Last »