Skip to main content
Rainbow and Unicorn
  • About Me
    • Projects
    • Resume
    • PGP
  • Contact Me
  • OSINT Fans
  • Home

Tag: phishing

How to Evade Expensive Phishing Filters with One Simple Trick

10th October 201816th December 2018 Gabor

One in three Australian law firms are susceptible to a cyber threat called “direct email spool attack”, our report can reveal. This attack technique bypasses expensive email security solutions, rendering them completely useless and exposing the affected organisations to cybercrime.

Read More

Five Ways to Identify Phishing Emails

4th October 201816th December 2018 Gabor

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. This is my up-to-date guide helping you recognise the latest email-based scams.

Read More

Why MFA on PEXA (Property Exchange Australia) leaves security concerns?

27th September 201816th December 2018 Gabor

PEXA (Property Exchange Australia) introduces multi-factor authentication to combat payment redirection fraud but leaves security concerns due to SIM swapping attacks.

Read More

Why You Need Professional Email Hosting for Your Business

30th August 201821st March 2019 Gabor

In this article, we explain how basic email hosting providers can put your business at risk of cyber attacks and why you should consider migrating to a professional email service.

Read More

Is Your Conveyancing Practice Secure From Hacking?

2nd August 201816th December 2018 Gabor

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack know as phishing to help commit payment redirection fraud.

Read More

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

1st August 201816th December 2018 Gabor

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts.

Read More

Posts navigation

Newer posts 1 2 3 4 Older posts

Rantings

  • Coding (5)
  • Comment (1)
  • Incident Response (6)
  • Privacy (4)
  • Security (53)
  • Technology (9)

Posts

  • September 2019 (1)
  • August 2019 (1)
  • June 2019 (1)
  • April 2019 (2)
  • February 2019 (1)
  • January 2019 (1)
  • November 2018 (3)
  • October 2018 (4)
  • September 2018 (2)
  • August 2018 (5)
  • July 2018 (4)
  • June 2018 (6)
  • January 2018 (1)
  • December 2017 (2)
  • October 2017 (1)
  • November 2016 (1)
  • October 2016 (2)
  • September 2016 (1)
  • July 2016 (1)
  • June 2016 (3)
  • May 2016 (2)
  • March 2016 (3)
  • February 2016 (1)
  • January 2016 (1)
  • December 2015 (1)
  • November 2015 (5)
  • October 2015 (1)
  • September 2015 (1)
  • August 2015 (2)
  • July 2015 (2)
  • June 2015 (1)
  • May 2015 (1)
  • April 2015 (1)
  • March 2015 (1)
  • February 2015 (1)
  • January 2015 (1)
  • December 2014 (2)

Tags

api april breach coffeescript conveyancing cryptoparty csirt cybersecurity database demisto DFIR direct email spool attack dns encryption governance hackedteam hardening javascript journalism legal malware meetup metasploit mssql mysql nodejs noscript oracle owasp patching phishing php policies privilege escalation python secops slides sri twitter two-factor waf web apps whistleblowing wordpress xss

Related Sites

  • OSINT Fans
  • Iron Bastion Security Blog
  • Iron Bastion Cyber Security Consulting
  • Arrow Networks Managed IT Services

Recent

  • 3 Cyber Security Tips for Small Business Owners
  • 4 Business Benefits of Professional Email Services for SMBs
  • 5 Benefits of Managed Email Hosting Services for Small Business
  • The 4 Deadly Technology Sins of a Small Business
  • 5 Reasons Why Your Small Business Should Outsource IT

Categories

  • Security
  • Technology
  • Incident Response
  • Coding
  • Privacy
  • Comment
Gabor's Security Blog All rights reserved
Theme by Colorlib Powered by WordPress