Tag Archives: cryptojacking

Microsoft Annual Security Report: Phishing Attacks Jump 250%

In 2018, Microsoft’s Security team analyzed more than 6.5 trillion security signals a day to identify security trends that expose organizations to significant cyber risks. Here’s what they found!

Phishing is Way Up!

After scanning more than 470 billion email messages sent and received in its Office 365 platform, Microsoft found that the number of phishing emails grew an alarming 250 percent. Making matters worse, techniques used by scammers are becoming more proficient and harder to detect because scammers are beginning to diversify the phishing attack techniques.

Diverse Attack Methods

According to the report, techniques used by attackers include domain spoofing & impersonation, user impersonation, text lures, credential phishing links, phishing attachments, and links to fake cloud storage locations. These sophisticated techniques make phishing emails appear legitimate, while presenting malicious files and links for a user to access. Continue reading Microsoft Annual Security Report: Phishing Attacks Jump 250%

Infect & Collect: How to Defend Yourself from Cryptojacking

The popularity of cryptocurrency is exploding but many consumers still lack even a basic understanding of cryptocurrencies which has resulted in a rise in illicit cryptocurrency mining activities.

The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security, recently released Security Tip (ST18-002), which highlights key cryptocurrency insights.

What is Cryptocurrency?

Cryptocurrency is digital money you use as a medium of exchange just like a dollar. Cryptocurrencies however do not need a central bank to verify a transaction. Rather, cryptocurrencies use encryption and the blockchain to verify transactions.

Cryptocurrency is earned through cryptomining, a process where individuals use cryptomining software to solve complex mathematical problems to validate transactions. Each of these solved equations verifies a transaction and earns that “miner” with a reward paid out in the cryptocurrency. Continue reading Infect & Collect: How to Defend Yourself from Cryptojacking