Social Engineering

Phishing Threat Campaigns

Phishing Threat Campaigns

Phishing Threat Campaigns – Who are the biggest targets of phishing threats? End-users are the most affected targets against phishing scams since they are targets of many spear-phishing attacks. 1. What are Phishing Threat Campaigns?  Phishing Threat Campaigns are used in phishing simulation campaigns which utilises many email scams that bypass the email [...]

Read more...
Get Protected Against Phishing Attacks

What is a Phishing Attack & How To Get Protected Against It

What is a Phishing Attack and How To Get Protected Against Phishing Attacks – One of the biggest problems on the internet today is the lack of phishing awareness.  In this blog, I will talk about what is phishing and how to get protected against it. Also, we will [...]

Read more...
What are 2020 Phishing Attack Techniques

What are 2020 Phishing Attack Techniques?

What are 2020 Phishing Attack Techniques – Fraudsters started looking for different ways to scam people on the internet nowadays. Technology develops, so do their attacking techniques. Having information on how they attack  is the best way to prevent them. In this blog, I will be taking about the [...]

Read more...
Google Reports Two Million Phishing Websites Created In 2020

Google Reports Two Million Phishing Websites Created In 2020

Two Million Phishing Websites Created in 2020 – Google reports that 2.02 million phishing websites have been created for 2020 so far. It has been determined that this number has increased by 19.91% when compared to 2019. This result revealed to what extent the coronavirus epidemic increased cyberattacks . 1- Which Phishing [...]

Read more...
Phishing Security: Attackers Use Google Services To Bypass Security

Phishing Security: Attackers Use Google Services To Bypass Security

Phishing Security: Attackers Use Google Services to Bypass Security Phishing Security: Attackers Use Google Services to Bypass Security – Attackers used a range of Google Services, including Forms, Documents, and many other services to initiate phishing attacks and Business Email Compromise (BECs). According to recent research, the recent increase in phishing [...]

Read more...
TELESCAM - VISHING - PHONE PHISHING

PENSION PLAN TELESCAM – VISHING – PHONE PHISHING: NINJIO SEASON 2, EPISODE 9

PENSION PLAN TELESCAM – VISHING – PHONE PHISHING: NINJIO SEASON 2, EPISODE 9 – Vishing—or voice phishing—telescam – phone phishing occurs when criminals use false phone calls to deceive people into giving money or sharing personal data. Vishing often includes a criminal impersonating a legitimate organization, company, or business agency. In [...]

Read more...
Tailgating

Tailgating

In this blog, the topic of Tailgating comes under our information security microscope. This method of social engineering can be easily overlooked in the cyber security world with the same potentially fatal consequences of other common attacks such as phishing, spear phishing, whaling, baiting and watering holes. All involve [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
MOBILE DEVICE SIDELOADING

MOBILE DEVICE SIDELOADING – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 3,

In our 3rd Episode of Season 2, we learn that a company’s payroll deposit went to hackers instead of employees, to the tune of $800,000.  While it might seem harmless at first , loading software from anywhere other than the manufacturer’s app store can be very risky.  Free is [...]

Read more...
REAL ESTATE WIRE FRAUD

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2 In our 2nd Episode of Season 2, a young family wires their 650k down payment for their new home to a fraudulent account. We come to find out that a hacker has taken over their real estate [...]

Read more...