Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is to fool unwitting victims into downloading the nasty, file-encrypting malware so they’ll be forced to pay a ransom in exchange for the decryption key. CSO Magazine last year found that 93% of all phishing emails contain ransomware. To protect yourself and your business, it’s important to know what emails and tricks to avoid. Here’s a look at phishing emails that have commonly used to spread CryptoLocker, CryptoWall, Locky and other notorious…

Continue reading

This is the start of the season. No, I am not talking about the Christmas season or the shopping season. I am referring to the phishing season. These are the biggest shopping days of the year, and these criminals know that the sales ads and offers will soon start pouring in. Buried among those offers will be phishing messages offering fake deals from these cybercriminals.  Use these tips to stay safe this year. Verify deals The first thing you can do is verify deals on the retailer’s website. If you receive a deal from…

Continue reading

For more than a decade, computer-generated digital certificates have made it possible to authenticate the identity of computer systems, data, and websites by connecting a public key with an identity such as an owner’s name.  The process relies on trust.  “Secure” websites utilize such a certificate to validate their identity.  This digital certificate is usually procured from a company that will verify the identity of the company administrating the site.  The digital certificate issued to them will be validated by a trusted root certificate authority or by a server that…

Continue reading

Scams exist.  That is a simple truth.  There are honest people, and then there are others who try to cheat.  Email and the technology age facilitate scamming through email.  Often these emails promise jobs or an irresistible offer, but sometimes they are more subtle than that.  This article analyzes the types of email phishing traipsing around the World Wide Web so that, armed with the knowledge of email phishing attacks, you can avoid them in the future. Phishing Tactic 1 - Irresistible Offer Here is the ultimate dream held by…

Continue reading

There are many new threats on the Internet, but that doesn't mean criminals don't try the tried and true methods as well.  Enter the pyramid scheme, stage left.  A pyramid scheme is much like the old chain letters people received when the post office was the en vogue form of communication. The way this scheme works is simple and very identifiable. One person begins at the top of the pyramid and recruits a few other people to “invest” some amount of money, say $100, into the initial investor. These new…

Continue reading

Despite the name, money mules are not good.  Money mules are people who are duped into laundering money for criminal groups unknowingly.  The criminals reap the rewards of the money laundering and the money mule takes the blame.  There are many scams out there that try to convert honest people into money laundering mules. An email arrives, often unsolicited, that asks whether or not you would like to change careers, receive copious amounts of money, and work unsupervised. Who wouldn’t want that?  Unfortunately, these are just scams designed to get…

Continue reading

Phishing schemes abound, but many use some form of the irresistible offer.  In this type of phishing, this dream of getting rich quick is exploited by informing you of your good fortune and how to make the dream come true. Take, for example, an email from Williams and Williams Probate division saying you’ve inherited $1 million from your distant relative in the UK.  Elated and overtaken with joy at your good fortune, you are asked to provide bank and other personal information so that the money can be wired to…

Continue reading

Phishing has finally gotten more interesting.  I am tired of the Nigerian phishing schemes that continually enter into my mailbox.  In the last week, I have received two new phishing ploys.  I want to post them so that others will be aware of them and also point out that phishing artists are becoming creative again.  Below are both messages.  Let's take a look at both emails to find out how you can tell if it is a phishing message.   Message #1 My Beloved one In Christ, Greeting’s in the…

Continue reading