Posts Tagged ‘attack’

Who's Behind the Gmail Phishing Attack? – NBC News

May 10, 2017


The Gmail phishing attack was 'particularly insidious,' according to experts, who said it was created by someone with considerable skill.
http://www.nbcnews.com/tech/security/who-s-behind-massive-gmail-phishing-attack-n754826

That Gmail phishing attack has taken a bizarre turn

May 9, 2017


A Twitter account from a user named Eugene Pupov took responsibility for the worm.
http://www.kwqc.com/content/news/That-Gmail-phishing-attack-has-taken-a-bizarre-turn-421402234.html

Keeping Your Homeseller Clients Safe From Attack

January 27, 2017


As a real estate agent, you must inform your clients that they should imagine the bad guy donning a suit, shaving and acting professionally.
http://www.inman.com/2017/01/19/keeping-homeseller-clients-safe-attack/

Small Business a favorite Attack Vector | Robert Siciliano

December 29, 2016


Small businesses are hardly immune to attacks by hackers. The illusion of low attack risks comes from the publicity that only huge corporations get when
http://robertsiciliano.com/blog/2016/12/29/small-business-a-favorite-attack-vector/

Small Business a favorite Attack Vector

December 29, 2016


Small businesses are hardly immune to attacks by hackers. The illusion of low attack risks comes from the publicity that only huge corporations get when they are breached, like Target, [ ]
http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/PvkKH7eI7fw/

Another Successful Ransomware Attack | Robert Siciliano

September 8, 2016


Ransomware thieves sure know how to pick their victims—institutions that store loads of highly critical data that they need on a daily basis, that without—even
http://robertsiciliano.com/blog/2016/09/08/another-successful-ransomware-attack/

Another Successful Ransomware Attack

September 8, 2016


Ransomware thieves sure know how to pick their victims—institutions that store loads of highly critical data that they need on a daily basis, that without—even just 24 hours without—can have [ ]
http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/I1oETOKqh_Q/

Your Ransomware Response: Prepare for the Worst

July 22, 2016


A ransomware attack is when your computer gets locked down or your files become inaccessible, and you are informed that in order to regain use of your computer or to [ ]
http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/9vRkI2fPrRY/