Google Docs used for Office 365 credential phishing
Phishers are using Google online services to take over Microsoft online service accounts.
49 articles
Phishers are using Google online services to take over Microsoft online service accounts.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
Why the computers in human resources are especially vulnerable, and how to protect them.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
In this episode, Dave and Jeff discuss the amount of scam e-mails tied to COVID-19, Facebook’s disinformation, working remotely, and more.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
The hidden dangers of out-of-office messages.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.