A look inside the FBI’s 2018 IC3 online crime report

Credit to Author: Christopher Boyd| Date: Wed, 24 Apr 2019 15:57:07 +0000

The FBI’s Internet Crime Complaint Center have released their 2018 report about online crime. Which attacks are most popular? Where are the victims located? And how much money has been lost in the process?

Categories:

Tags:

(Read more…)

The post A look inside the FBI’s 2018 IC3 online crime report appeared first on Malwarebytes Labs.

Read more

Don’t Blame Employees who fall for a BEC scam!

Credit to Author: Chris Taylor| Date: Thu, 14 Feb 2019 17:00:55 +0000

The BBC reports that a media company based in Scotland is now suing a former employee who fell for a Business Email Compromise (BEC) scam. In the scam, the employee received emails which appeared to be from the managing director and requested wire transfers. The employee worked with her line manager on the first payment…

The post Don’t Blame Employees who fall for a BEC scam! appeared first on .

Read more

Business email compromise scam costs Pathé $21.5 million

Credit to Author: Christopher Boyd| Date: Mon, 19 Nov 2018 16:00:23 +0000

Recently released court documents show European-based cinema chain Pathé lost a small fortune to a business email compromise (BEC) scam in March 2018. The attack cost the company $21.5 million—that’s 10 percent of its total earnings. Learn how to avoid BEC scams and keep your company in the black.

Categories:

Tags:

(Read more…)

The post Business email compromise scam costs Pathé $21.5 million appeared first on Malwarebytes Labs.

Read more

How to create a sticky cybersecurity training program

Credit to Author: Jovi Umawing| Date: Thu, 08 Nov 2018 17:00:00 +0000

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Categories:

Tags:

(Read more…)

The post How to create a sticky cybersecurity training program appeared first on Malwarebytes Labs.

Read more

It’s Everyone’s Job to Ensure Online Safety at Work

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 17 Oct 2018 13:05:17 +0000

As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.  Let’s discuss some of the areas where we see existing organizations employees may be lacking in…

The post It’s Everyone’s Job to Ensure Online Safety at Work appeared first on .

Read more

The BEC List: Helping Thwart Business Email Compromise through Collaboration

Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000

Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has…

The post The BEC List: Helping Thwart Business Email Compromise through Collaboration appeared first on .

Read more

This Week in Security News: Tracking and Hacking

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 07 Sep 2018 11:30:46 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.  This week, Google revealed a secret deal with Mastercard that allows it to track what users buy offline. Also, Senate and House representatives warn that regulation may be coming for…

The post This Week in Security News: Tracking and Hacking appeared first on .

Read more

Stop Impersonations of Your CEO by Checking the Writing Style

Credit to Author: Chris Taylor| Date: Wed, 05 Sep 2018 19:25:23 +0000

If one of your employees receives an email that looks like it’s from the CEO asking to send sensitive data or to make a wire transfer, could that employee spot it as a fake based on how it is written? He or she may be so concerned with pleasing the CEO that they may urgently…

The post Stop Impersonations of Your CEO by Checking the Writing Style appeared first on .

Read more