How often have you received an email (or for that matter an instant message) with marketing graphics embedded into it? I am guessing all the time? These marketing graphics are image files (GIF, JPG, PNG) that are added to the message. Remote Images Cyber criminals often include images in their phishing messages to represent the... Continue Reading →
Business Email Compromise Attacks
We have talked about Phishing and Social Engineering in other blogs and the standard precautions you can take to help thwart cyber criminals attempts at fraud. Business Email Compromise (BEC) is a form of cyber crime which uses email fraud to attack commercial, Government and non-profit organizations to achieve a specific outcome which negatively impacts... Continue Reading →
Deep Fakes
Deep fake is a term given to a persuasive-looking but false video and audio files. Made using cutting-edge and relatively accessible AI technology, they purport to show a real person doing or saying something they did not. This can manifest itself in Hollywood films where a greenscreen special effect is used to put the actor... Continue Reading →
Keeping Safe Online – A Pocket Guide
Being online these days, especially in the current environment when so many people are working from home and outside the protection of the company network, we all need to be extra vigilant that we don't click on a link to malware. This blog is going to go through a number of tips to keep you... Continue Reading →
Scams and Fraud 101 – A Pocket Guide
This blog is another in our series of Pock Guides. As we are approaching Christmas and New Year, we are all out for a bargain. This is a time when criminals will tempt you into buying something that looks too good to believe, but in your haste to get the cheapest price on something you... Continue Reading →
Myths of Cyber Security
I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →