Introduction and an Email Address Tip Trevor Collins recently blogged about a Netflix phishing attempt he caught on to. I received a phish-y Netflix email as well and I wanted to take the time to blog about the email to help add additional value of how to spot such emails. Earlier this week I also wrote about email spoofing and phishing, and what to look for in identifying … [Read more...]
How to Spot Spoofed or Phishing Emails on Your Mobile Device
Full disclaimer: spotting spoofed or phishing emails on a mobile device like a cell phone or a tablet isn’t as straightforward as on a laptop or desktop. As you’ll see shortly, mobile clients can hide a lot of the telltale signs of a phish. This post will use a spoofed email claiming to be from our CTO Corey Nachreiner, sent to Trevor and myself, with Marc cc’d. The main focus … [Read more...]
Android Vulnerability: NFC and Android Beam
Nightwatch Cybersecurity’s Y. Shafranovich posted about a near filed communication (NFC) vulnerability affecting Android versions 8.0 and higher. Specifically, there is an Android feature known as Android Beam that’s built around this technology, and it’s intended for close-proximity data-sharing scenarios. NFC has an effective range of about 4 cm (1.5 inches), which doesn’t … [Read more...]
Spain’s Businesses Targeted by Cyber Attacks
In the seemingly never-ending barrage of cyber crime, Spain is now in the limelight. CBROnline.com reports that at least two businesses were hit with cyber attacks in the latest wave of attacks against Spain. The ransomware variant used has yet to be identified but is suspected of being Bitpaymer or Ryuk. There have also been surges in BlueKeep detections, so it is thought that … [Read more...]
Another City Cyber Attack: Johannesburg
Another day, another cyber attack. Not just on a business entity though, but rather another city! About 24 hours ago, the city of Johannesburg detected unauthorized access to their networked systems and have taken immediate action. Check out their Twitter post below. Click here for direct access to their Twitter page. The investigation will take about 24 hours … [Read more...]