Category Archives: Independent Agents

A New Twist On An Old Trick | Stewart Title Blog

Image overlay is when a hacker creates a blurred image of a document that resembles a form you would recognize and overlays it with a login prompt. The image is designed to pique your interest or create a sense of importance or value. The concept of image overlay isn’t new, but today it has a …Read more

Combating Malicious ZIP Files | Stewart Title Blog

While cloud services like OneDrive, Box and Dropbox give us endless possibilities to share files, we sometimes still find ourselves sending and receiving ZIP attachments when multiple files are involved. ZIP files would be okay except sometimes they can be dangerous. You may be thinking, “What about password-protected ZIP files?” Well, cybercriminals most commonly send …Read more

Don’t Be a Fool This April | Stewart Title Blog

If you haven’t fallen for the $5,000 COVID-19 vaccine, $400 COVID-19 self-testing test kit or the $150 bottle of Lysol scams, then congratulations, you’ve stood your ground. But now is not the time to let your guard down – new tricks are coming to defraud you. On March 27, the president signed a bill to …Read more

Combating Redirecting URL Links | Stewart Title Blog

In the past, I’ve revealed that one evasion technique cybercriminals use to avoid being blocked by email security technologies, is using legitimate (Microsoft) websites. This week Threatpost.com shared this new interesting twist: attackers are using YouTube and redirect features to get you to click on malicious links. Redirector URLs are commonly used by legitimate organizations …Read more

Who Are You Really Replying To? | Stewart Title Blog

Today’s phish-of-the-week is nothing special, but there are two lessons to learn. At first glance, it’s a very plain and straightforward phishing email (Figure 1) attempting to steal user credentials by portraying itself as a closing document. Nothing out of the ordinary, yet it came with a lot of other emails and with perfect timing …Read more