Email scams have become increasingly sophisticated in recent years, with scammers using a range of tactics to try to trick people into giving away sensitive information. One of the most common tactics is to send emails from nearly identical email addresses or domains,...
I observed a style of unsolicited “look-a-like” invoice today that I had not seen before. This company attempts to spook those who have registered a new business entity (with the state) into purchasing labor law related compliance materials. There is an...
Email scammers never seem to rest when looking for ways to bypass business spam filters. Sometimes their intent is to encrypt files while holding them for ransom ($$), other times their intent is to simply wreak havoc. Either way, computer users today must be adept at...
No matter how great the spam filter a business employs, the occasional malicious email will still make it through to end users. A decent analogy might be that of a battle of tug-o-war between good and bad actors. The bad actors develop a new kind of spam intended to...
The invoice below was sent in by a client for verification. Although it looks very much like like an invoice; if one reads the fine print it becomes clear that it is actually a solicitation for a website listing on a relatively obscure internet directory. The internet...
4 Types of Social Engineering Used Every Day Article by Calyptix Security. August 28th, 2017 Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when...