News & Blog

Our stories.

New Position: Account Manager

We are accepting applications for a full-time Account Manager, to work alongside the existing sales team in Lexington, KY. Experience in sales is required. Technology or software sales experience is a plus, but not required.

APWG Phishing Activity Trends Report | 4th Quarter 2016

The APWG Phishing Activity Trends Report for 4th Quarter 2016 indicates that the total number of phishing attacks in 2016 was 1,220,523, which is a 65% increase over 2015. Phishing activity in early 2016 was the highest ever recorded by APWG since i

Ransomware Completely Shuts Down Ohio Town Government

The Licking County government offices in Ohio, including the police force have been shut down by ransomware. It’s clear that someone in the office caught a bug in a phishing scam or by downloading it and now their servers are locked up.

Email Phishing Scams

The style of identity theft is extremely widespread because of the ease with which unsuspecting people share personal information. Phishing scams often lure people with spam email and instant messages requesting people to verify their account or confirm their billing address through what is actually a malicious website. Email phishing scams are carried out by tech-savvy con artists and identity th...

Kaspersky Lab 2016 Report

Internet fraud has been around for just about as long as the Internet itself.  According to a Kaspersky Lab 2016 Report, each year, cybercriminals come up with new techniques and tactics to fool their potential victims.  Phishing emails include fake notifications from banks, e-payment systems, email providers, social networks, online games, etc.  The aim of these em...

Verizon Data Breach Investigations Report Summary 2016

The Verizon Data Breach Investigations Report Summary highlights key information related to social engineering. Now in its ninth year of publication, the “Verizon 2016 Data Breach Investigations Report” analyzes more than 2,260 confirmed data breaches and more than 100,000 reported security incidents in this year’s report – the highest since the report’s inception in ...

Advanced Persistent Threat (APT) Kill-Chain

According to Netswitch Technology Management, the Advanced Persistent Threat (APT) kill-chain looks like the following: Social Engineering: Identify individuals that have the needed access privileges. Spear Phishing: Attackers send spoofed e-mails with malicious links to download malware and infect high-value employee machines. Malware Infection: malware is downloaded on a system within ...

The Six Steps of an APT Attack

To improve your cyber security and successfully prevent, detect and resolve advanced persistent threats, you need to know how APTs work: The cyber-criminal or threat actor gains entry through an e-mail, network, file or application vulnerability and inserts malware into an organizational network. The network is considered compromised, but not breached. The advanced malware probes for addit...

Advanced Persistent Threats

Advanced Persistent Threat (APT) campaigns comprise a growing part of the current threat landscape. Some APT campaigns remain active, in fact, even after drawing extensive media attention. APT Campaign routines may vary over time but their primary goal remains the same – to gain entry to a target organization’s network and obtain confidential information.There are two ways to look...

Spear Phishing

Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing messages appear to come from a trusted source. Phishing messages usually appear to come from a large and well-known company or website with a broad membership base, such as eBay or PayPal. In the case of spear phishing, the apparent source of t...

Phishing

Phishing is the attempt to acquire sensitive informative such as usernames, passwords and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Phishing is the illegal attempt to acquire sensitive information for malicious reasons.Traditional phishing attacks are usually conducted by sending malicious e-mails to as many people...

Anti-Phishing Work Group (APWG)

Semi-annually, the Anti-Phishing Working Group (APWG) publishes the Phishing Activity Trends Report. These reports address phishing trends and underscore the significance of phishing by quantifying the scope of the global phishing problem.Key findings in the APWG Phishing Trends Report for Q4 2015: The Retail/Service sector became the most-targeted industry sector in the fourth quarter...

Symantec Internet Security Threat Report: 2016

Symantec Internet Security Threat Report: 2016The Symantec Internet Security Threat Report includes vast information on security related issues. Spam, phishing and malware data are captured through a variety of sources. These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze and provide informed commentary on emerging trends in attacks, malic...

Verizon Data Breach Investigations Report Summary 2015

Since the 90s, phishing continues to evolve and continues to trick, especially those in communications, legal and customer service areas.  According to the Verizon 2015 Data Breach Investigations Report, 23% of recipients open phishing messages and 11% click on attachments to those messages.  Of more concern, 50% of recipients open e-mails and click on phishing links within the first h...

Summary of Global Phishing Survey 2H 2014

Semi-annually, the Anti-Phishing Working Group (APWG) publishes the Global Phishing Survey. This report addresses phishing trends and underscores the significance of phishing by quantifying the scope of the global phishing problem. In this report, APWG examines all the phishing attacks detected in the second half of 2014, July 1 through December 31).Major findings were as follow: In th...

Symantec Report Shows 82% Of Social Media Attacks Are Fake Offerings

The monthly Symantec Intelligence Report identifies their latest analysis of the security landscape concerning malware, spam, and other cyber threats. There are several interesting facts identified in this report. 82 percent of all social media attacks so far in 2013 have been fake offerings. This is up from 56 percent in 2012. The global phishing rate is up in August, comprisi...

Summary of Global Phishing Survey 1H 2013

Semi-annually, the Anti-Phishing Working Group (APWG) publishes the Global Phishing Survey: Trends and Domain Name Use. This reports addresses phishing trends and underscores the significance of phishing by quantifying the scope of the global phishing problem. In this report, the APWG examines all the phishing attacks detected in the first half of 2013 (“1H2013”, January 1 to June...

Phishing Activity Trends Summary 2013

The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report 2013 analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website and by e-mail submissions. The APWG also measures the evolution, proliferation, and propagation of crimeware by drawing from the research of its member companies. This rep...

Security Awareness Training vs. Testing: Who's doing what?

Security awareness training is important. In today’s business environment, information security is important.  Securing information helps keep competitive advantages, meet regulatory compliance, and satisfy customer expectations.  Security compromises can be expensive in direct expenditures, such as fixing a vulnerability, and indirect costs, such as damage to reputation.  A...