For legality’s sake, let’s say the scammer was trying to impersonate Uppercase Two Bank. Overall appearance At first glance, the email seems legitimate enough. However, I notice inconsistencies in the design. You don’t have to be a graphic designer to get an overall blegh feeling from this email. There’s at least 5 different types of fonts, [...]
We routinely work with computers that are inundated with viruses, Trojans, botnets and other harmful types of malware. They’re often so bogged down running deceptive background processes that it’s impossible to browse the web or open your email program. Even though most systems have some sort of antivirus or anti-malware, it’s still possible for malware [...]
Mobile Device Madness Media outlets around the country reported that Google had pulled 21 apps from its Android Marketplace, citing concerns over malware. Google moved swiftly to remove the malware-riddled apps from their online store, however more than 50,000 Android users downloaded these applications before they could be taken down. Those numbers vary, and I [...]
Many organizations simply overlook the importance of social engineering. To Social or Not to Social? For a number of years now, social engineering testing of an organization’s defenses has been an integral part of most security management programs – you have an outside party conduct vulnerability assessments, penetration tests and audits, and just for good [...]
Data classification will ensure the long-term security of your company. If you were to give most IT folks at a mid-sized business a pen and ask them to draw a diagram of the types of data they handle coming into and out of their network, they probably couldn’t. To be fair, it’s not entirely their fault. [...]
Facebook apps are fine and dandy, but did you know that you can get viruses or other forms of malware through Facebook, or even have your identity stolen? It’s true.