X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - NEWSDAY.CO.TT - A la Une - Hier 04:30

Where cybersecurity threats begin: Phishing

According to a 2021 CISCO report, most successful data breaches – more than 90 per cent – are the result of data phishing. Using information gathered via a range of techniques, scammers, hackers and ransomware groups steal from individuals, perpetrate scams on groups of people and penetrate otherwise-secure company systems using captured credentials. The exposure to such risks increases dramatically in an age of work from home or work from where you are, when remote connections to company networks can be an additional vulnerability. It's important to understand first that phishing is not one thing. The term describes a range of techniques that all involve a successful masquerade by a bad actor as a way to earn trust from an unwitting victim. The only effective solution to this pervasive problem is to educate computer users, an undertaking that has to be continuous because of the changing nature of these scams. But it's the only way to encourage safe use of the internet and to close potential gaps in any business networks that they use to get their work done. These scams are designed differently for individual home users and for business users and the goals are sometimes different. Home users are usually targeted with schemes that try either to gather personally identifiable information (PII) to access bank accounts or to create an invented situation in which the target sends money to the scammer. Business users are usually targeted with schemes that encourage them to send the scammer PII such as log-in credentials or other information that will make a front-door penetration of the company's computer systems. Phishing takes advantage of the minimal investment and wide digital distribution systems of the internet to prey on a large group of potential targets. [caption id="attachment_1135944" align="alignnone" width="1024"] CPanel scam target owners of internet domains who might be confused about how these systems work. -[/caption] But phishing attempts that are too general drift into more obvious absurdities. The most effective falsified communications target users with messages that are personalised, persuasively written, appear genuine, using familiar graphics and design cues and request an action that appears sensible, if somewhat dramatic. When the work is done carefully to achieve a professional finish and a tempting lure for social engineering, these messages can fool even the digitally paranoid. There are some hard lines every computer users needs to draw. Do not submit PII to anyone, anywhere, unless you have initiated the contact and are absolutely clear that you are speaking with/logged into/e-mailing/form-filling in an environment you are certain is secure. If someone calls you asking for PII and claiming to represent a company, ask for a name and promise to call back. Then call the listed number of the business or organisation. Do not click on links requesting contact, updated information, offering incredible deals or an urgent response to an emergency situation. Take note of the information and contact the party through official and public channels. Links in phishing e-mail often lead to spoofed websites, careful duplicates of an official website created to do only one thing: harvest any PII you put into their online forms. Be clear that for a phishing attempt to work, you will be offering the information. You are being hacked – but it's your inclination to trust that is under attack. Computer users in a work-from-home environment are, not surprisingly, likely to be identified as targets of both kinds of phishing attempts, with e-mails, notifications and messages targeting both the resident and the employee in the same space. If, for instance, you are working at home or at a comfortable location with an unsecured WiFi network, the free access may not be a gift. These WiFi access points can be configured with packet sniffers that collect all the information that's transmitted. [caption id="attachment_1135945" align="alignnone" width="1024"] Domain Masquerade: Most domain references will show up in the domain owner's mailbox, even faked ones, making a bulk e-mailed attack look personal. -[/caption] Company e-mails that appear official but are not part of any notification issued or expected from a manager or the IT department should be forwarded to your company's IT department for verification. When a company is targeted for digital infiltration, references to official communications and publicly accessible information will be part of the effort to make faked communications appear more realistic. This effort becomes even more sophisticated when top-level executives at a company are targeted – a specialised version of phishing known rather unflatteringly as "whaling." At that level, spelling errors, bad English and clumsy references to the company's operations disappear and victims are duped by fluent boardroom-speak and an understanding of the company's operations. A digital sting at that level targets hundreds of thousands of dollars at minimum. A version of this, the business e-mail compromise (BEC), uses a valid but hijacked company address to send e-mails to subordinates to gather information that is used to gather additional PII to be used in escalating access to the company network. In another version of this, the Man in the Middle attack, a hacker will pose as an intermediary in a communications chain, collecting and passing along company information while sifting it for credentials and other useful data. Angry customers venting online are vulnerable to angler phishing, in which an apparently sympathetic customer service representative contacts them offering to solve the problem and all that's needed is their…PII. Given the focus on e-mail and messaging-based phishing, it's sometimes difficult to sift well-intentioned but unsolicited messages, routine but poorly phrased communications and legitimate notifications from an avalanche of spam liberally laced with harmful e-mails. Software tools can flag the most obvious of these phishing attempts, but social engineering is becoming more sophisticated. The public information that individuals share on social media fuels more realistic phishing attempts, which in turn get linked to that personal information to create persuasive digital identities. That's the endgame, and the only effective response is to limit not just private, but also unnecessary public information-sharing to short-circuit the process. Share what's necessary. Confirm before giving anyone your PII either on the phone, via e-mail or on a web form. Insist on proof of identity from anyone contacting you, and communicate directly with any business they claim to represent.   The post Where cybersecurity threats begin: Phishing appeared first on Trinidad and Tobago Newsday.

Articles similaires

Record Start to 2025 Propels Real Over the 25,000-Agent Mark

reitreport.ca - 27/Jan 03:01

January 2025 on track to be the fastest growth month in the company’s history TORONTO & NEW YORK--(BUSINESS WIRE)--$REAX #therealbrokerage--The...

Visionary Leader Ryan Rodenbeck Brings Spyglass Realty to Real

reitreport.ca - 20/Jan 03:01

Addition of top-producing independent brokerage nearly doubles Real’s agent count in Austin TORONTO & NEW YORK--(BUSINESS WIRE)--$REAX...

Sorry! Image not available at this time

Comment on Why the latest draft feed-in solar tariffs are wrong, and not fair by Ian

reneweconomy.com.au - 28/Jan 15:20

To a solar household, the grid is just virtual battery. You ‘charge it’ with solar exports and then draw from it with electricity imports. You...

Police hiding at night

newsday.co.tt - 19/Jan 06:46

Dr Rowley’s bald statement last week about police stations being locked and kept unlit at night produced a quick and assertive response from the...

China’s DeepSeek AI Tops App Charts In US, Europe

eurasiareview.com - 28/Jan 00:17

By Luisetta Mudie China’s homegrown open-source artificial intelligence model DeepSeek topped app charts in the United States and Europe on...

Ravi Balgobin Maharaj demands information on state legal fees

newsday.co.tt - 27/Jan 03:29

SOCIAL activist and public-interest advocate, Ravi Balgobin Maharaj, is challenging the refusal to fully disclose details of attorneys paid millions...

Senator slams teachers for ‘obscene’ lessons for cash

newsday.co.tt - 29/Jan 22:34

CHAIRMAN of the Parliament's Social Services and Public Administration Joint Select Committee Dr Paul Richards believes it is wrong for teachers...

Honor Magic7 Pro Review – A Flagship Phone Worth Paying Attention

thecekodok.com - 16/Jan 23:13

Honor provides another interesting offering with the Magic7 Pro model. This is not the first time Honor has given a complete focus to the premium...

Real’s December Agent Survey: Growing Optimism for Market Recovery

reitreport.ca - 23/Jan 03:02

Survey Highlights Expectations for Continued Commission Rate Stability in 2025 TORONTO & NEW YORK--(BUSINESS WIRE)--The Real Brokerage Inc. (NASDAQ:...

15 Exciting Technologies and Products Announced at CES 2025

thecekodok.com - 20/Jan 23:20

The 2025 Consumer Electronics Show took place two weeks ago in Las Vegas, Nevada, USA, and is one of the largest consumer technology events in the...

Les derniers communiqués

  • Aucun élément