phishing - Machado Consulting's News You Can Use | Worcester, Massachusetts | Machado Consulting

Login

Machado Consulting's News You Can Use

Welcome to our blog where you can find everything from tech-tips to keeping your data secure. Have any questions? We'd love to hear from you!

Learn to Spot Phishing Attacks Beating Two-Factor Authentication

Learn to Spot Phishing Attacks Beating Two-Factor Authentication

Unfortunately, one of the most effective defenses against phishing attacks has suddenly become a lot less dependable. This means that you and your users must be ready to catch these attempts instead. Here, we’ll review a few new attacks that can be included in a phishing attempt, and how you and your users can better identify them for yourselves.

Continue reading
0 Comments

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness of an issue doesn’t always result in preventing attacks. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

Continue reading
0 Comments

Expecting the Unexpected: Phishing

Expecting the Unexpected: Phishing

Phishing attacks attempt to coerce information from users. They are especially sinister because they use personalized messages to target specific users or businesses. Unlike spam emails, which are typically generic in nature, phishing attacks can yield major resultsbecause messages are so convincing.


 

Phishing is BIG business! With a review of the year’s most clicked subject lines, we looked for trends that could easily be identified. The five subject line categories that appeared quarter-over-quarter related to: deliveries, passwordscompany policies, vacation, and IT Department (in the wild) emails.

Some of the most common 'In the Wild' attacks in this period were:

  • Apple: You recently requested a password reset for your Apple ID
  • Sharepoint: You Have Received 2 New Fax Messages
  • Docusign: You've received a Document for Signature
  • ZipRecruiter: ZipRecruiter Account Suspended
  • IT System Support
  • Amazon: Your Order Summary
  • Office 365: Suspicious Activity Report

Here’s a look at the Top 10 Most-Clicked General Email Subjects in Q4 2018: 

  • Password Check Required Immediately/Change of Password Required Immediately 19%
  • Your Order with Amazon.com/Your Amazon Order Receipt 16%
  • Announcement: Change in Holiday Schedule 11%
  • Happy Holidays! Have a drink on us. 10%
  • Problem with the Bank Account 8%
  • De-activation of [[email]] in Process 8%
  • Wire Department 8%
  • Revised Vacation & Sick Time Policy 7%
  • Last reminder: please respond immediately 6%
  • UPS Label Delivery 1ZBE312TNY00015011 6%  

Be sure to protect yourself by double checking the sender’s name, full email address and URLs. You should suspect malicious intent if the sender is asking for any personal information or money, also, if there are spelling mistakes or a strong sense of urgency to respond, you are likely the almost-victim of a phishing scam. Don’t give them any information and make sure you mark the email as spam. If you have any questions or suspicions about an email you receive, feel free to contact us. 

 For a full infographic on these most common phishing attempts, click here.

Continue reading
0 Comments

Learn to Use Email Safely

Learn to Use Email Safely

Email is a core component of any business. 124.5 billion business emails are sent and received each day. That's a massive amount of communication and can be a wide-open door to security threats. Are the emails that are coming and going from your business secure?  In order to keep your email security at a premium, we have outlined the following tips:

Continue reading
0 Comments

Protect Your Business From Phishing Attacks

Protect Your Business From Phishing Attacks

Spam is a major hindrance when running a business that relies on email, but it’s easy to protect your employee’s time from the average spam messages with the right technological support. Unfortunately, hackers have adapted to this change and made it more difficult to identify scam emails. More specifically, they have turned to customizing their spam messages to hit specific individuals within organizations.

Continue reading
0 Comments

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

Continue reading
0 Comments

Beware: Avoiding the Hurricane Harvey Charity Fraud

Beware: Avoiding the Hurricane Harvey Charity Fraud

Over the weekend we’ve seen Hurricane Harvey hit the Gulf of Texas, especially Houston, where many of Americans are in need of help. Naturally, we all want to do what we can in donating to charities directly affecting the well-being of those affected. Unfortunately, we also have to be aware of the scammers of the world looking to make a quick buck off those generous enough to donate.

Continue reading
0 Comments

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

Continue reading
0 Comments

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

Continue reading
0 Comments

W-2 Phishing Scams on the Rise FBI and IRS Reports

W-2 Phishing Scams on the Rise FBI and IRS Reports

The FBI and IRS have repeatedly warned the public about W-2 phishing scams, and that number has significantly increased this year. W-2 scams are hitting everywhere, even a Cybersecurity Contractor was hit with one of these!

Continue reading
0 Comments

Search Blog

Subscribe to Our Blog