According to statista.com IT Security spending in 2018 in the United States alone will reach $66B - an incredible number.
It is said that that the only things in life that are guaranteed are death and taxes, and with the end of year hurtling towards us, tax season is underway. I can barely remember when my birthday is, but April 15th is a date that never slips any of our minds. The phishing attack we’re sharing today is a clever attempt at domain spoofing, and plays off the victim’s anxieties by amping up the fear that their TurboTax account has been compromised.
Email is nearly ubiquitous in the workplace. It is one of the most durable and effective forms of communication. It is also exceptionally vulnerable to attacks. While it may be easy to spot the fake emails from the British lawyer or Nigerian prince wanting to give you millions, today’s hackers are sophisticated and targeted.
“I took a screenshot through the camera of your device, synchronizing with what you are watching... I think that you do not want all your contacts to get these files, right? If you are of the same opinion, then I think that $811 is quite a fair price to destroy the dirt I created.”
The United States Postal Service, they drive on the right, and as the saying goes; neither snow nor rain nor heat nor gloom of night stays these couriers from the swift completion of their appointed rounds. I must be honest, things do breakdown a bit when it snows. That said, of all our much-maligned public services is there any group of people we trust more than the United States Postal Service? When was the last time you lost a letter or had a package compromised? It’s with that backdrop of trust that today’s catch of day arrives…
Trends in Phishing Emails Hitting Businesses Today
In law enforcement circles, sophisticated email phishing schemes are known as "business email compromise." More commonly called CEO Fraud or CFO fraud, they are targeting C-suites executives with increasing effectiveness.
What is Phishing?
The most common types of cyber crimes defy the stereotype of a hacker writing code and breaching firewalls with sophisticated methods. In reality, their methods are fairly simple. They "phish" for a way into your system or to gain access to your personal information.