Cybercrime doesn’t stop just because it’s getting closer to the silly season – in fact this is when cybercriminals ramp up their activity, so you need be extra careful. Below are some of the recent scams noted by MailGuard, one is a fake email pretending to be from Netflix and another is a phishing scam from PayPal. Netflix Email Scam
It’s that time of the month again where we highlight the latest email scams circulating the world wide web, courtesy of MailGuard. See below some scams Aussies should be looking out for. The first is from Australia Post and the Second TPG and iinet. Australia Post Scam Firstly, Australia Post is being targeted by a phishing email scam where it
Email scams never stop and neither do we! For the month of September there are two more scams that have popped up on MailGuard’s radar that you should be aware of. The first one involves using Adobe Document Cloud to harvest a user’s credentials and the second scam is a Zoom-like phishing email. Adobe Document Cloud This Adobe phishing scam
Here at Bang IT Solutions we want to keep our clients up to date with the current email scams to make sure they avoid a potential data breach. For the month of August two new email scams have been highlighted by MailGuard that are currently circulating people’s inboxes. One is using compromised Dropbox accounts to scam users and another asks
What is Phishing? Phishing is the fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The cyber attack dubbed “PhishPoint” demonstrates the craftiness and extent cyber criminals will go to in order to harvest Office 365 credentials. Context can be
Office 365 backups You probably assume that Microsoft takes care of backups in regards to Office 365, Exchange, Onedrive and Sharepoint. While Microsoft does look after the underlying infrastructure and application up-time, it is the responsibility of the customer to protect and manage their valuable business data. When it comes to working in cloud-based applications, the option of granular recovery
One of the latest phishing scams doing the rounds is using Apple branding to try and dupe victims. The scam functions by first sending victims an email detailing that their Apple ID has been locked. This email contains a link that supposedly takes the victim to the Apple website where they can unlock the account. The website is of course
Phishing is a method used by hackers to try to obtain your personal data. The ideal result of phishing is to get hold of an unwilling user’s details such as login credentials and/ or bank details. Another possible consequence of this attack is where a user accidently downloads malware. The malware then infects the user’s PC. Phishing attacks solely rely
In the last few months we have noticed an increase in the amount of scam/ phishing emails. These kinds of emails are constructed by a scammer to try and trick a user into providing personal information such as bank details and passwords. The emails appear to be sent from a legitimate sender. The quantity of such emails is of course
We are all aware of the role a password plays in data access security. They function in the same way a physical padlock does. They prevent unauthorized access. We are also fully aware that passwords should be complex and near-on impossible to crack. However, the percentage of people that actually take this advice on board is startling. In a recent
Recent Comments