Archives - Phishing


What is social engineering?

Cybercriminals perform social engineering techniques such as phishing, baiting and spear phishing to manipulate their targets into disclosing personal information. Social engineering relies on human interaction to get access to the confidential information they need to commit cybercrimes. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or […]

Pay attention to URLs

You might already be aware that one of the tell-tale signs of a phishing ploy is a misspelled domain name or a destination where the true URL is masked by using a link shortener. Be wary of these links, but also look for “https” at the beginning of URLs through which you transmit sensitive data. […]

Access important accounts from web browser not links

Phishing is one of the oldest and most effective cyberattack techniques. Never click on any emailed or texted links claiming to take you to your account page for a password reset or other modification to decrease your risk of having sensitive data stolen. Instead, if you’re uncertain whether action is warranted, type the URL directly […]

Beware of smishing attempts

“Smishing” is a portmanteau of “SMS” (short message service) and “phishing,” a cybersecurity threat where malicious actors attempt to fool users into clicking links, downloading malware or handing over personal information, usually by email. Basically, smishing is phishing done via text message. Be skeptical of any unsolicited, automated text messages delivered over shortcodes that contain […]

Watch out for fake Coronavirus scams and charities

The COVID-19 pandemic has spurred a surge in charitable giving, with many high-profile events capturing the public’s attention. The iHeart Radio Living Room Concert for America, hosted by Elton John on March 29, 2020, was one such occasion: It brought in $10 million in donations and was watched by nearly 9 million viewers across the […]

Phishing — It only takes one time

Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.