Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Phishing

Infradapt Blog

This is some blog description about this site

How to Spot Three Forms of Phishing Attacks

How to Spot Three Forms of Phishing Attacks
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and malware, all the way to sophisticated attacks on targeted individuals known as phishing attacks. Do you have ways to secure your business?

Continue reading
0 Comment

3 Phishing Scams You Might Have Missed in 2017

3 Phishing Scams You Might Have Missed in 2017

Cybercrime continues to be a major threat to your organization’s security, and there’s no way to really escape it. Hackers are so prevalent on the Internet that you could actually be dealing with attacks from all sides. Phishing in particular has seen a dramatic rise over recent years, and you need to be wary of email scams designed to steal sensitive credentials.


In fact, according to the Webroot Quarterly Threat Trend Reports, at least 1.4 million phishing websites are set up every month. These reports estimate that this past May, there was an all-time high for phishing website increase, topping off at over 2.3 million websites being set up during that month. Phishing has become the single most prominent method of fraud in the modern business world, and is responsible for most data breaches worldwide.

2017 saw an uncanny number of phishing attacks. Here are three of them that you may have missed.

Amazon Shipping Phishing Scam
Earlier this year, a phishing scam made it appear that Amazon was sending emails about canceled orders or updates to user accounts. They appeared to be legitimate, but users were receiving these messages even if they hadn’t recently canceled an order. If users clicked on links located in the email, they would be directed to a domain that was either close to Amazon, or an entirely different domain. These emails convince users to hand over important credentials, like login information or financial details (credit card number, expiration date, etc.). If you receive an email claiming to be from Amazon, but you never made an order, be wary of it.

Google Docs Hack
Google Docs works by sending you an email containing a link to the document being shared with you. While it’s a best practice to never click on a link in an unsolicited email, you might think that a message from a company as big as Google could be trustworthy. Unfortunately, this isn’t always the case. This phishing scam works by convincing users to grant permissions to a third-party app rather than actually stealing your credentials. It’s part of a growing trend where phishing attacks are growing more sophisticated, which should raise some concerns for business owners.

IRS W-2 Tax Season Phishing Scams
Your organization has sensitive documents on-file that contain employee financial information, among other important personal data. Tax season is the opportune time for hackers to try and steal this information via phony tax return messages, as users are going to be on the lookout for information on how and when they can process their tax returns. Businesses in particular should be wary of recent phishing attacks asking for specific W-2s or personal information about users.

Is your business prepared to stand against phishing attacks? If you have any questions or concerns, reach out to Infradapt at 800.394.2301.

Continue reading
0 Comment

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

Continue reading
0 Comment

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries