Five Emails you don’t want in your Inbox

Phishing attacks are the most common form of cyber attack. Why? The simplicity of email gives cybercriminals an easy route in, allowing them to reach users directly with no defensive barriers, to mislead, harvest credentials and spread malicious elemen… Continue reading Five Emails you don’t want in your Inbox

New Sextortion Scam Uses Alternative Cryptocurrencies to Evade Detection

A new sextortion scam variant is using a wallet for a cryptocurrency other than bitcoin in an attempt to evade detection. On October 8, Cofense revealed it had detected a modified sextortion scam that was using a wallet address for Litecoin instead of … Continue reading New Sextortion Scam Uses Alternative Cryptocurrencies to Evade Detection

New malware records screen activity as victim watches porn

By Uzair Amir
The IT security researchers at ESET have discovered a nasty new malware that not only steals users’ private and financial data but also keeps an eye on their browsing activities including recording their screen whenever they watch pornogr… Continue reading New malware records screen activity as victim watches porn

Protecting Against Spear Phishing Attacks: A Guide

As security practices evolve, cybercriminals are finding new methods to carry out their attacks. Using highly personalized email attacks, carefully designed spear phishing attacks are being used to steal sensitive information such as login credentials… Continue reading Protecting Against Spear Phishing Attacks: A Guide