Skip to main content
Rainbow and Unicorn
  • About Me
    • Projects
    • Resume
    • PGP
  • Contact Me
  • OSINT Fans
  • Home

Tag: phishing

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

26th June 201816th December 2018 Gabor

A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the PEXA platform at settlement recently. We explain the most likely way the fraud occurred and what practical things you can do today to protect your business from similar attacks.

Read More

How you can protect your Microsoft Exchange email service from cyber attacks

22nd June 201816th December 2018 Gabor

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security?

Read More

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

19th June 201816th December 2018 Gabor

A major cyber threat to businesses like yours is impersonation scams. The scheme usually involves cybercriminals mimicking business owners and executives through the use of phishing emails. The good news is that your IT staff can take some measures to protect your business, and here is how.

Read More

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

13th June 201816th December 2018 Gabor

High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. We showcase a range of real-world phishing emails caught by our anti-phishing technology, which would have otherwise ended up in our clients’ inboxes.

Read More

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

13th June 201821st March 2019 Gabor

As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you or your business from becoming a phishing victim.

Read More

Posts pagination

Newer posts 1 … 3 4

Ramblings

  • Coding (7)
  • Comment (1)
  • Forensics (2)
  • Incident Response (7)
  • Privacy (5)
  • Security (59)
  • Technology (11)

Posts

  • December 2022 (1)
  • July 2022 (1)
  • June 2022 (1)
  • May 2022 (1)
  • April 2022 (1)
  • March 2022 (2)
  • February 2022 (1)
  • January 2022 (1)
  • May 2021 (1)
  • September 2019 (1)
  • August 2019 (1)
  • June 2019 (1)
  • April 2019 (2)
  • February 2019 (1)
  • January 2019 (1)
  • November 2018 (3)
  • October 2018 (4)
  • September 2018 (2)
  • August 2018 (5)
  • July 2018 (4)
  • June 2018 (6)
  • January 2018 (1)
  • December 2017 (2)
  • October 2017 (1)
  • November 2016 (1)
  • October 2016 (2)
  • September 2016 (1)
  • July 2016 (1)
  • June 2016 (3)
  • May 2016 (2)
  • March 2016 (3)
  • February 2016 (1)
  • January 2016 (1)
  • December 2015 (1)
  • November 2015 (5)
  • October 2015 (1)
  • September 2015 (1)
  • August 2015 (2)
  • July 2015 (2)
  • June 2015 (1)
  • May 2015 (1)
  • April 2015 (1)
  • March 2015 (1)
  • February 2015 (1)
  • January 2015 (1)
  • December 2014 (2)

Tags

api breach conveyancing cryptoparty csirt csu cybersecurity database demisto DFIR direct email spool attack dns email encryption governance hackedteam hardening javascript journalism legal malware Managed Services meetup metasploit noscript oracle owasp patching phishing php policies privilege escalation python raspberry pi secops slides Small Business sri tech support scams twitter two-factor web apps whistleblowing wordpress xss

Related Sites

  • OSINT Fans
  • Iron Bastion Security Blog
  • Iron Bastion Cyber Security Consulting
  • Arrow Networks Managed IT Services

Recent

  • Are Technical Support Scams Getting More Advanced?
  • Five Eyes Cyber Security Predictions
  • Removing Secrets From Your Source Code
  • Ukraine Power Grid Cyberattacks
  • Cyberwar and Cyberterrorism: What is the Difference?

Categories

  • Security
  • Technology
  • Coding
  • Incident Response
  • Privacy
  • Forensics
Gabor's Security Blog All rights reserved
Theme by Colorlib Powered by WordPress