Skip to Main

Updates

Image-Based Phishing

 

Images may be used by cyber attackers to perform a phishing attack just like a malicious link or an infected attachment. Clicking an image or graphic included in an email may execute malware, initiate a malicious download, or send you to a website intended to steal your credentials or financial information.

Phishing – Back to Basics

 

Phishing attacks happen fast! According to Verizon 2024 Data Breach Investigations Report, “The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. That leads to a frightening finding: The median time for users to fall for phishing emails is less than 60 seconds.”

Dumpster Diving

 

Dumpster diving is searching someone’s trash for information that can be used to launch a social engineering and/or computer system attack.

Free Digital Offerings

 

Are you tempted to install “free” software from the internet? Have you considered the hidden cost you pay for free apps, social media, toolbars, search engines and other digital offerings that look too good to pass up?

World Password Day

 

May 2, 2024, is World Password Day, with the goal of raising awareness about the importance of good password hygiene.

Shoulder Surfing

 

Protect your information from thieves lurking in plain sight.

Dual-Purpose Phish

 

Cyber experts have identified a dual-purpose phishing attack that attempts to harvest user credentials and deliver malware.

Types of Phishing

 

Phishing is a type of attack that targets individuals through email, text messages, phone calls, and other forms of communication. Be alert to these common types of phishing.

Business Email Compromise (BEC) Attacks

 

A business email compromise (BEC) attack is a type of phishing attack in which a cybercriminal impersonates a trusted contact and uses social engineering techniques to trick an email recipient into transferring funds into a fraudulent account.

Juice Jacking

 

“Juice Jacking” is a type of cyberattack on an electronic device while being charged at a public charging kiosk.