shark tank host phishing attack

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February. Barbara Corcoran, a renowned real-estate broker and business expert, admitted last month that …

March 31st, 2020

Melissa Virus

The Melissa Virus is malware that was was deployed in late March of 1999. A programmer by the name of David Lee Smith took over an America Online (AOL) account …

February 5th, 2020

Vishing

Vishing is the fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to have individuals give out personal information, up to …

January 7th, 2020

Smishing

Smishing is another form of phishing, where a hacker sends a malicious text or SMS message trying to trick someone into giving them sensitive information. Smishing can be more dangerous …

January 7th, 2020

spearphishing attack

Spear-Phishing

Spear-Phishing is a form of phishing attack that targets a specific person or organization, seeking access to sensitive information. Similar to phishing, this is done through spoofing emails that appear …

January 7th, 2020

Whaling

Whaling refers to malicious hacking that targets high ranking executives. Similar to phishing, whaling is where the hacker hunts for data that they can use, but they focus on high-ranking …

January 7th, 2020

Typosquatting

Cybersquatting

Cybersquatting, also known as “Typosquatting“, is the act of registering, trafficking, or using a domain name in bad faith. For example, phishing attacks are used against users to gain their …

December 26th, 2019

social engineering

Social Engineering

Social Engineering in the context of cyber security, is when one uses psychological manipulation to have people perform specific actions or to give out confidential information. This differs from the …

December 24th, 2019

Spoofing

Spoofing is faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system. Spoofing is also known as the deliberate inducement of a user or …

December 20th, 2019

Phish Testing

CyberHoot: Phishing Attacks

Spotting and Avoiding Phishing Attacks This CyberHoot core curriculum and BootCamp video outlines the common attack patterns found in phishing attacks and provides the viewer with a clear set of …

December 17th, 2019

Phish Testing

How to Protect Yourself from Phishing Attacks

This video details what could happen if you follow criminals suggested actions and logged into their spoofed website and lost your credentials or installed malware on your computer by running …

December 17th, 2019

Phish Testing

Phishing Training

This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when you are phished and turn over account numbers, passwords, or other critical …

December 17th, 2019

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more importantly the critical data it contains, until a sum of money or ransom …

December 16th, 2019

Phishing

Phishing is a digital form of social engineering to deceive individuals into providing sensitive information. This is typically done via email, having people click on links that allow hackers to …

December 16th, 2019

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT provider. Virtual Care Provider Inc. (VCPI), provides security, data hosting and access management services …

December 3rd, 2019