This past July, Twitter fell victim to an infamous social engineering attack. The attack gave hackers control of over one hundred high-profile accounts - from politicians to celebrities. The hackers used these accounts to scam Twitter followers out of money. Now, cybercriminals are using this event as bait for a convincing phishing scam.
The phishing email uses text that is very similar to the official statement that Twitter made in response to the July attack. The email claims that due to a security breach, you must confirm your identity by clicking on a link in the email. If you click the link, you are redirected to a site that looks very similar to the real Twitter login page. The site is actually a look-alike designed to steal your login credentials. Any information that you enter on this page is delivered straight to the bad guys.
Don’t be fooled! Follow these tips:
Infamous Twitter Hack Inspires a New Phishing Attack
Oct 2, 2020 10:36:41 AM / by KnowBe4 posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Cybercrime, Cyber Crime, Phishing
Business Continuity vs. Disaster Recovery
Aug 19, 2020 8:30:00 AM / by Alma Vieru posted in IT, technology, Cybersecurity, COVID-19, Business Continuity, Disaster Recovery, BCDR, Small Business, Business
It was the early morning hours when the phone rang. A fire had broken out in the building where we had our business. We threw on our coats and raced to the location. All I saw were flames and smoke as the firefighters worked to gain control of the blaze. It wasn't a surprise when I was informed the structure was a total loss - and everything in it. Where do we go from here?
Warning! Vendor Email Compromise on the Rise
Aug 12, 2020 9:00:00 AM / by April L. Sy and James Keeler posted in IT, security, Cyber-Security, Cybersecurity, Email Compromise, Vendor Email Compromise, VEC, Cybercrime, Cyber Crime, Silent Starling
There’s a phishing attack out there that is stealthy and not easily detected until the damage is done. It’s called Vendor Email Compromise, and it’s worth billions worldwide.
Don't Let Returning Computers Infect Your Office
May 6, 2020 8:00:00 PM / by LMT Tech posted in IT, security, technology, Cyber-Security, Cybersecurity, ITSupport, COVID-19, Remote workforce returning to the office, New York Reopens, Returning to the Office
Just as you should take precautions to make sure returning workers aren't sick, you will want to make sure returning computers are not sick as well. It is imperative that incoming computers are checked for infections and safety measures are performed before you allow them back onto the corporate network.