I have lost track of the number of services that I am being offered include “AI” to make them better, more helpful, intuitive, etc., etc., etc.. Even my Microsoft 365 for Business comes with AI interfering, sorry helping at every turn. But what happens when the threat actors get their …
It All Starts with a Phishing Email
Following my article yesterday about phishing emails, here on Smart Thinking, I have contunued the phishing email advice over on CyberAwake today. This time we are looking at the big targets: It All Starts with a Phishing Email – CyberAwake Do you need cyber security awareness training? WE understand that …
Someone is Trying to Get In – A Real Email Phishing Attack
I recently wrote a couple of articles looking at some real-world email phishing attacks aimed at me – the links are below. This article is about another that happened this past weekend. Email Phishing Attack – The “wear you down” tactic. One of the favourite tactics threat actors use is …
Continue reading “Someone is Trying to Get In – A Real Email Phishing Attack”
Social Engineering – Getting the Victim Ready
Last week I wrote about a technically advanced, highly sophisticated cyber-attack in Hong Kong, that netted the attackers $25m – it all started with some simple social engineering pretexting. You may not have $25m in your bank account but here is the state of play of deep fake hacking What …
Continue reading “Social Engineering – Getting the Victim Ready”
Quishing!
Here is an interesting article from the National Cyber Security Centre about whether you should trust public QR codes. Now we have had experience with this. One of our clients found that someone had stuck a new QR code over the one they displayed in their window. When I investigated, …