The cyber threats that businesses face today are deceptive, destructive, and targeted. They target large and small companies, exposing customers to financial damage and data theft. Nearly 88% of small business owners think their data is vulnerable to a cyberattack. With so many threats from all corners, the team at Ooma released a graphic packed with data on cybersecurity and tips on best practices.
The cyber threats that businesses face today are deceptive, destructive, and targeted. They target large and small companies, exposing customers to financial damage and data theft. Nearly 88% of small business owners think their data is vulnerable to a cyberattack. With so many threats from all corners, the team at Ooma released a graphic packed with data on cybersecurity and tips on best practices.
Eighty-five percent of all received emails are spam or phishing. Although it may usually seem to simply be an annoyance, the truth is that it can cost businesses thousands of dollars, or even cost the success of the entire business if the business is small enough.
Of course, the cost to businesses is also in time, money, customer retention, and productivity. The problem is that phishing emails are very easy to miss. They can be deceptive and easy to fall for. In fact, 19.8% of employees click phishing links, and 1 in 25 branded emails are phishing attacks.
Let’s talk about the latest scam to hit the masses. Typically when you think about common ways people steal from you, you’re first to think about things such as card fraud, identity theft, and phishing. A new threat that has been emerging is stealing from people in a new way - their home title and all of their equity that they worked so hard over the years to build up. From the years 2015 to 2019, real estate and rental fraud was more than 2.6 times the rate of even credit card fraud.
Here are the steps of a typical home title theft scam:
A recent PayPal phishing attack is attempting to steal users’
account credentials and other sensitive information that can be used for
identity theft.
The phishing campaign is actively being carried out in the form
of text messages that are pretended to be from PayPal, telling users that their
account has been permanently limited and asking them to click on a link to verify
their account. Usually when a suspicious or fraudulent activity on an account
is detected by PayPal, the account’s status is set to "limited,"
which puts temporary restrictions on activities such as withdrawing, sending,
or receiving money.
By clicking on the link given in the phishing message, users
are taken to a phishing page where they are prompted to log in to their PayPal account.
Logging in on the phishing page would send the users’ PayPal credentials to the
attackers and the phishing page would even try to collect further information
from users, such as their name, date of birth, address, bank details, and more.
The collected information can then provide an opportunity to attackers for identity theft and they can even gain access to other accounts using that information.
Web domain registrar GoDaddy just pulled an uncool prank on
its employees by sending them an email phishing test that promised them a $650
holiday bonus. Employees who clicked the link in the email reported
receiving another email 2 days later, where instead of receiving the promised
holiday bonus, they were asked to take a training course on social engineering.
Phishing is one of the most common types of hacking. These phishing e-mails have links which when clicked, lead to shady and untrustworthy websites. It is via those websites that hackers try to retrieve your information. Not every Internet user has the sense or experience to detect these shady scam emails. The one reason that it can be hard to detect such emails at one glance is that they usually have usernames that are similar to the entity they are impersonating.
Say, if someone is new to the Internet and receives an email allegedly from Nokia, they might fall into the trap if they don't examine the e-mail address carefully and find 'Nokkia' instead of 'Nokia' written there. Big brands do not jumble up or fidget with the letters of their brand names, so that's a clear trap which gets overlooked by gullible people or those users that get carried away by what the e-mail contains, for instance, it can be a lottery.
The concept of phishing was developed by The Warez Community - often referred to as The Scene - in the 1990s. The Scene is an underground tech group that specializes in the distribution of copyrighted materials (i.e. film, music, games, etc). Before phishing even got its name, it began on AOL with random credit card generators.
The Scene would used these randomly generated credit card numbers to open fake AOL accounts under a previous phishing victim’s name. With this, The Scene used the victim’s hacked account to send even more phishing messages to the victim’s contacts - essentially, a never-ending process.
Eventually, AOL stepped up with new security measures that prevented the use of randomly generated credit card numbers; however, The Scene had already moved on to the next scam: fake AOL Administrator accounts. Hacking the system itself, The Scene had full control. To read more about the history and future of phishing, check out the infographic below.









