Tag Archives: phishing scam

Defend against this new Office 365 threat

Some hackers have become so skilled that they don’t even need you to give up your credentials to hack into your account. One recent cyberthreat is targeted towards users of Microsoft Office 365. You don’t want to be the next victim, so read up. A phishing scam that harvests users’ credentials The latest cyberattack on […]

Posted in General Articles A, Security | Also tagged , , , , , | Comments closed

How phishers harvest Office 365 credentials

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]

Posted in General Articles B, Security | Also tagged , , , , , | Comments closed

Office 365 hacking: What you need to know

There really is an app for almost everything — including one that cybercriminals use to hack into businesses’ systems. Cyberattacks have become so advanced that they are now aided by an app, like this one that poses serious threats to Office 365 users. If you’re using Office 365, here’s what you need to know. A […]

Posted in General Articles C, Security | Also tagged , , , , , | Comments closed

Scammers deriving new ways to scam via VoIP

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details. The best way to prevent yourself from being scammed […]

Posted in General Articles A, VoIP | Also tagged , , , , | Comments closed

Protect your VoIP system from phishers

Although many companies still use analog phones, a growing number of businesses now rely on VoIP (Voice over Internet Protocol), thanks to its multi-functionality. VoIP allows employees to make voice calls, conduct video conferences, and chat using an internet connection. This has become a means, however, for many scammers to send fraudulent emails, extort money, […]

Posted in General Articles C, VoIP | Also tagged , , , , | Comments closed

Phishing through VoIP: How scammers do it

Many businesses nowadays are well-armed against email-based phishing scams, which is why scammers have moved over to VoIP (Voice over Internet Protocol) scams. Through “vishing scams,” hackers can pretend to be bank representatives and convince your employees to provide confidential financial details via a seemingly innocuous VoIP call. Take a look at why vishing is […]

Posted in General Articles B, VoIP | Also tagged , , , , | Comments closed

Phishing alert: scammers now use encryption

When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes. How hackers use encryption to carry out phishing scams According […]

Posted in General Articles C, Security | Also tagged , , , | Comments closed

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption […]

Posted in General Articles B, Security | Also tagged , , , | Comments closed

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

Posted in General Articles A, Security | Also tagged , , , | Comments closed

How to protect your VoIP system from phishing

Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems. Through ‘vishing scams,’ hackers can disguise themselves as a bank representative and convince your employees to provide confidential financial details via a seemingly harmless VoIP call. Your business will be well-served by guarding itself from […]

Posted in General Articles A, VoIP | Also tagged , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.