Technical support scams (TSS) are responsible for a growing amount of financial losses year after year. Nevertheless, while the victims are losing more money than ever, the number of interactions between criminals and victims is decreasing. Why? Because the scammers are getting better at what they do. In this paper, I demonstrate through examples how the TSS practices have become more advanced recently.
Tag: phishing
![](https://cdn9.gaborszathmari.me/wp-content/uploads/2019/08/4-ways-your-business-benefits-from-professional-email-service-wp.jpg)
4 Business Benefits of Professional Email Services for SMBs
How your business can benefit from Office 365 and G Suite? Get more things done with the free add-ons and protect your business with the security features.
![](https://cdn9.gaborszathmari.me/wp-content/uploads/2019/01/run-effective-phishing-awareness-training-wp.jpg)
How to Run Effective Security Awareness Training for your Organisation
Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training sessions.
![](https://cdn9.gaborszathmari.me/wp-content/uploads/2018/11/cocos-island-wp.jpg)
What Phishing Campaigns Have in Common with Cocos Islands?
Phishing is one of the main reasons why Australian businesses are getting hacked. What has an exotic paradise in the middle of the Indian Ocean to do with cyber crime? Iron Bastion experts explain how Cocos (Keeling) Islands enables criminals to defraud organisations and individuals worldwide.
![](https://cdn9.gaborszathmari.me/wp-content/uploads/2018/11/phishing-top-reason-ndb-wp.jpg)
Phishing Is the Top Reason Behind Australian Data Breaches
The latest Notifiable Data Breaches Quarterly Statistics Report confirms that Australian legal practices are at risk of cybercrime with phishing as the main threat.
![](https://cdn9.gaborszathmari.me/wp-content/uploads/2018/10/evading-part3-wp.jpg)
Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide)
This how-to guide aims to demonstrate how easy it is to circumvent expensive email security solutions with simple open-source tools. Email administrators can also follow this guide to build their email delivery service for email direct spool attack security assessments.