Skip to main content

Posts

Fake e-mail scanner

  Fake e-mail scanner A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims. In recent years, news about e-mail-based infections of corporate networks has been fairly regular (and generally connected with ransomware). So, it’s no surprise that scammers periodically use the topic to try to extract credentials for corporate mail accounts by persuading company employees to run a scan of their mailbox. The ploy is aimed at people who know about the potential threat of malware in e-mail but have insufficient understanding of how to deal with it. Infosec personnel would do well to explain the tricks to employees and use such examples to illustrate what employees should look for to avoid falling victim to cybercriminals. Phishing e-mail This scam message employs the time-honored trick of victim intimidation. You can see it right in the header, which reads “Virus Alert” followed by three exclamation points. However trifling punctuation may se...

Five permissions Android games do not need

  Five permissions Android games do not need You can refuse some permissions to greedy games, and they most definitely do not need these five. By default, apps on your phone have very limited permissions. To gain access to most of your data — and potentially dangerous Android features — they need your explicit consent . Android does that for security reasons; if permissions have potential for abuse, it’s better if an app doesn’t have them by default. Apps actually need some permissions to do their jobs. For example, AR games really do require access to the camera. But even legitimate apps often want more than they really need. Here are five permissions that bona fide games definitely don’t need, and of course malware masquerading as a game would love to have. For this post, we’re using the names of permissions and their paths in the “clean” Android 10. In other versions and on devices from some vendors, they may differ slightly. Accessibility What it is. Accessibility comprises a...

More Connected Than Ever Before: How We Build Our Digital Comfort Zones

  More Connected Than Ever Before: How We Build Our Digital Comfort Zones Key Findings Due to self-isolation measures, we are spending almost 2 more hours a day online, compared to before lockdown began. 61% of millennials say they are concerned about how the increase in their online dating will sabotage their security. 36% of millennials admitted to knowing that they should be doing more to strengthen their digital privacy. 33% of surveyed parents have recently become more lenient with the amount of time their children are spending online. 52% of families trust their children to keep themselves safe online. 42% of respondents believe the ‘digital comfort zone’ is feeling safe and secure online/not worrying about security and data safety Introduction There is no place like home for bringing you that feeling of safety, security, and comfort. As we evolve into an increasingly technologically led society, our homes are no longer just physical dwellings but are becoming our own p...