Going Smishing

August 26th, 2018 by Jennifer Lough

Fun, but very important, fact: your smartphone is not immune to the various hazards that attack computers. You’ve heard of phishing, which typically works through email. Smishing  is similar, but it relies on text messages to reel in victims. Like phishing, a smishing message looks like it comes from someone you trust, like a bank, or a family member. The goal is to get personal information from you, such as your social security number, passwords, and other things the attackers can use. Often, they will then try to steal your identity or your money, but sometimes there will also be malware in the message that gives them access to your phone.

There are a few reasons smishing can be more dangerous to you than phishing. Read the rest of this entry »


It’s Time to Get Serious About End User Security

October 11th, 2016 by Pamela Michael

End User Security It’s time to get serious about end user security. According to Symantec’s 2016 Internet Security Threat Report, spear-phishing campaigns targeting employees increased 55 percent in 2015. Of those attacks, 43% were aimed at companies with less than 250 employees. Ransomware increased by 35% and expanded to target any network-connected device, including smartphones and tablets. Cross-over attacks are also on the rise. What does all this mean? If you’re not training your team to identify and avoid these attacks, it’s no longer a matter of if you’ll get hit, it’s merely a matter of when. Read the rest of this entry »


How Dyre Wolf Malware is Stealing Millions from Corporate Bank Accounts

April 8th, 2015 by Pamela Michael

microvisionsinc.comDyre Wolf has been unleashed on Corporate America.

This new and sophisticated attack, carried out by a seasoned gang of cyber criminals, utilizes malware and social engineering to dupe unsuspecting employees into divulging sensitive banking information. Millions of dollars have reportedly been stolen so far, and if your team isn’t properly trained and informed you could be next.

Here’s how it works:  Read the rest of this entry »