Categories
IT Security Outsourced IT

Smishing

What is Smishing? Smishing, also known as SMS phishing, is a type of phishing attack that is carried out through mobile text messaging. In smishing attacks, cyberattackers use social engineering techniques over short messages services (SMS) to steal your personal data and then use that information to commit financially incentivized crimes. Smishing is completed in […]

Categories
IT Security Outsourced IT

SIM-Swapping Attack

What is a SIM-Swapping Attack? SIM swapping, sometimes called SIM hijacking, occurs when a device tied to a customer’s phone number is fraudulently manipulated. Cyberattackers usually employ SIM swapping as a way to receive one-time security codes from banks, cryptocurrency exchanges, and other financial institutions. A study by Princeton University found that four-fifths of SIM-swap […]

Categories
IT Security Outsourced IT

Ransomcloud

What are Ransomcloud Attacks? Ransomware attacks are cyberattacks that use malware to compromise a user’s device, such as a desktop, laptop, or mobile device. The ransomware encrypts the user’s data so that they can no longer access it, and then they typically spread the ransomware to other computers on the network- inflicting the same damage […]

Categories
IT Security Outsourced IT

Remote Access Trojan

What is a RAT? A remote access trojan (RAT) is a type of malware that gives a cyberattacker remote access of a computer. Once the cyberattacker has gained control of the computer, they can use the infected machine for a litany of activities including viewing and downloading files, deleting files, editing or implanting data, logging […]

Categories
Application Security IT Security

Multi-Persona Impersonation

What is Multi-Persona Impersonation? Multi-Personal Impersonation (MPI) is a new email phishing technique that can make detection even more difficult for email users. The MPI technique uses the psychology principle of “social proof” to increase the perception of authenticity of emails, increasing the likelihood that unsuspecting recipients will click on them.1 The principle of social […]

Categories
IT Security

Enterprise Threats from Social Media Phishing

What are Enterprise Threats from Social Media Phishing? Social media phishing refers to a cyberattack executed through social media platforms such as Instagram, Facebook, LinkedIn, and Twitter. The purpose of social media cyberattacks are to steal personal data or to gain control of social media accounts. Social media phishing cyberattacks are a type of social […]

Categories
Application Security IT Security Outsourced IT

Mobile Phishing

What is Mobile Phishing? Phishing cyberattacks are increasingly targeting mobile devices, as these types of cyberattacks are effective and relatively simple to launch. In a mobile phishing cyberattack, the cyberattacker may harvest credentials to gain access to corporate or personal resources. Corporate access can be used for stealing personal data, and personal access can also […]

Categories
Application Security IT Security Outsourced IT

Spear Phishing

What is Spear Phishing? Phishing and spear phishing cyberattacks are quite common. Phishing cyberattacks are undertaken by emailing very large numbers of recipients, often randomly, with the expectation that a small percentage of them will respond, enabling the cyberattacker to carry out their agenda which may be to install malware or to redirect the users […]

Categories
Application Security IT Security Websites

Password Security

Password fatigue refers to the feeling experienced by many people who are required to remember an excessive amount of password as part of their daily routine. It is not uncommon for people to deal with these feelings by creating a password that meets many common minimum password requirements, such as being at least 8 characters […]

Categories
Application Security IT Security Outsourced IT

Social Engineering Penetration Testing

Penetration testing attempts to exploit vulnerabilities in systems, networks, human resources, or physical assets in order to test the effectiveness of security controls. Social engineering is the psychological manipulation of people to prompt them into performing certain actions or divulging sensitive information. Social engineering penetration testing, then, uses different forms of social engineering attacks to […]