Tag: phishing (Page 1 of 2)

SiteLock Website Security

Identifying Common Types of Cyberattacks

Is your website behaving strangely? Have you noticed it’s taking a long time to load, or that there are new pages, lines of code, or files on your site you didn’t create? Or perhaps you’ve seen a drastic decrease in site traffic, or you suddenly can’t log in as an admin? These are just a few visible signs that your site might be experiencing a cyberattack.

Of course, just because you’re not experiencing any of these symptoms doesn’t mean your website is secure. In fact, it’s possible for attacks and infections on your website to go undetected for years. To help ensure your site isn’t a target for cyberattacks, you need to know what you’re dealing with. In this blog, we’ll discuss what cyberattacks are, the most common types of attacks your website is likely to face, and most importantly, how you can prevent them.

Read More

law firm cyber security

Identifying Law Firm Website Vulnerabilities

“Law firms are tremendous concentrations of really critical, private information. Infiltrating those computer systems is a really optimal way to obtain economic and personal information,” a statement on the state of security for law firms by Bradford Bleier, unit chief of FBI cyber division.

Every day, law firms manage sensitive information for their clients, including mergers and acquisitions, investments, business strategies and other intellectual property. This has made them a prime target for phishing and cyberattacks. In fact, Cisco’s 2015 Annual Security Report named law firms as the seventh highest target for cybercriminals. October is Cybersecurity Awareness Month, which is why now, more than ever, it is necessary to identify and resolve vulnerabilities within your firm.

Read More

phishing attack

Be Cautious of Phishing Emails From “Your Boss”

Have you ever signed into your email only to find a flood of unread emails? Silly question, of course you have. Some of those emails probably get deleted immediately, while others might sit idle in your inbox for weeks. Then there are those emails from your mom, your bank or your boss that require a prompt response… especially the ones from your boss (sorry mom). Have you ever had the feeling that maybe the email labeled as from your boss actually isn’t from your boss at all? This may seem a little far-fetched, but it does happen, and it happens quite often.

Read More

Tax refund

Learn How to Protect Your Tax Refund from Hackers

Filing for your taxes can be a nuisance, but the refund you receive is well worth the effort, especially if you have big plans for your tax credit. But how would you feel if your refund check was stolen?

Read More

How To Distinguish Promotional Emails from Phishing Scams

Your inbox is exploding with holiday promotional emails by now. It is likely that your favorite store is offering 25% off your entire purchase, and all you have to do is “redeem now.” But before you click on that enticing link, consider who the email is actually coming from. Phishing emails are well-crafted emails that trick the user into clicking on links or attachments that collect personal and financial information or contain malware. While deals are great, think before you click, especially during the holiday season.

Read More

malware email addresses

Looking at 1,000 Malware Email Addresses

Why Email Addresses?

When the SiteLock support teams clean malware from websites, it’s not unusual to find email addresses somewhere in the injected code.  So the research team decided to dig into some of those  malware email addresses to see what we could learn.

With the help of the SECCON (security concierge) and Expert Services teams, we gathered over 1,000 email addresses in short order. We hoped to see potential patterns such as highly used email providers and learn how the addresses were used, with the added benefit of providing a list of strings to detect malware.

Where Malware Email Addresses Can Be Found

The list of 1,012 email addresses consists mostly of phishing repositories, with some shell install and login notifications, ego addresses, and a few spoofed “From” addresses from phishing files. The full list of malware email addresses is found at WSTNPHX’s GitHub page.

Read More

Cyber Monday Security

How to Safely Shop Online During Cyber Monday

It’s easy to get wrapped up in the holiday frenzy. With the allure of Cyber Monday markdowns, it’s easy to forget to use proper precautions when shopping online. Everyone expects that all the ecommerce sites are safe, but there is always the possibility of getting tricked into visiting a website managed by cybercriminals. Here are a couple things to be mindful of as you shop online this weekend.

Read More

phishing attack

Phishing Attacks And How to Counter Them

In this week’s post, we take a look at “in-the-wild” phishing attacks and talk about how to counter them. Protecting yourself from phishing and malware attacks is not only important, it’s a fundamental Internet survival skill, made even more essential if you have a web presence you depend on. A compromised workstation could lead to compromised credentials, ultimately leading to complete control of your website by bad actors. We don’t want that.

Read More

Don’t Let Your Employees Become The Enemy

top8Of all the threats that could be stalking your business daily, it is most unpleasant to think about the fact that the biggest threat could already be inside your walls, maybe even on your payroll. Unfortunately there’s plenty of evidence to suggest that the biggest source and cause of security incidents is the humble employee.

The good news is that few of these incidents are deliberate attacks or frauds by your most trusted insiders. Instead they tend to be innocent mistakes which could easily be avoided but which are quickly taken advantage of by hackers.

Read More

Protecting Customer Data

Customer DataIdentity theft is the number one crime in America, a crime that claims an average of more than a million new victims every 30 days. And many of those victims are as a result of businesses that leak their customer information, usually by accident, and often through their website.

Read More

Page 1 of 2

Powered by WordPress