In the past, we’ve talked about phishing emails that contain a hyperlink to malicious websites. Traditionally, these are identifiable through boxes, buttons or phrases within the email. When you move your cursor over them, the cursor changes to the hand and displays the content of the URL. This week’s sample email represents an old but …Read more
I’ve covered the use of social media in social engineering attacks a number of times. Statistically, social media continues to be a starting point for crafting elaborate social engineering or phishing attacks. Let’s run through a refresher. Sharing too much private information on social media is dangerous. If you’re not sure what to share, follow …Read more
Few things in our fast-paced society are as time tested as the real estate closing process – but going “e” makes the relocation process quick and convenient.