EvilGinx is a prime example of some of the amazing tools out there that came be used for Phishing. If you haven’t heard of it, EvilGinx was release a few years back and showed us a weak point in 2FA. For most back then, MFA was a sure way to thwart the bad guys and it make the system or user account “impenetrable”…..
This morning, several people are reporting that they had received a text message reporting that they had been fined. These are fake as at this moment in time, the above SMS has been the only confirmed SMS message that has been sent out by the Government…..
As the pandemic continues, we are all looking for the latest information or data in order to keep ourselves and our family’s safe. You would have most likely seen an increase in emails from all the companies you associate with, giving you an update on what they are doing during this crisis…..
Below are a few sites which can help you identify if the site or email in question is a phish/fake….
If suddenly you find that Google Calendar is telling you to pick up that iPhone 11 you’ve won, don’t worry, you’ve not been hacked. Most likely what has happened is that a Phishermen has sent multiple calendar invites to you knowing that they can abuse Google Calendars default event settings…….
If you have two-factor authentication (2FA) enabled on your account, you can’t be compromised, right? Well, not exactly. As technology advances, so do the attackers. Phishing attacks have become more sophisticated and attackers are finding ways to bypass 2FA. The reason why is because of the delicious cookies stored in your browser. Session cookies are a way to show the server that the user has already authenticated. This includes passing the 2FA…….
HiddenEye is a modern-day phishing tool. The advanced capabilities and ease of use really make Phishing life simple. With just a few clicks, you can spin up a fake phishing site with keylogging capabilities. It is a really cool tool to use…..
When thinking of phishing, you might think of ‘Winning the Nigeran lottery’ or ‘Paying a small holding fee so that a prince can make you rich’. These were common attempts back in the day and the aim was to trick you so that you would send the scammer money. Since then, Phisher-men and women have evolved and are now using new techniques. What these people want though are very different things. Nowadays these types of attacks aim to steal personal details, credentials, money or even to infect the users machine……
Phishing isn’t something new. In fact, today, it’s one of the most common forms of cybercrime. Although we are all… Read more How Company Branding Could Help Protect Your Microsoft Credentials.