The shiny new phishing tactic on the block is malvertising, or the efforts of threat actors to mimic a legitimate company’s website, landing pages, URL, and more. Google Ads has recently come under fire for their handling of final destination URLs, and the relative...
SpireTech Company News and Tips
Phishing
More spam/phish than ever
Our service desk always gets a lot of questions about whether or not an email is legitimate. If you suspect an email is not legitimate, it probably is not – usually your gut instinct is correct here. 95% of the...
How to report spam to Microsoft 365
Getting a lot of annoying spam in your email? Here's a quick guide on how to report spam in Microsoft 365. For customers using Office 365’s built-in junk mail filter, there is an outlook plugin you can install to report spam that gets past Microsoft’s filters and move...
How to detect phishing and scam emails
At SpireTech, our managed services clients often contact the helpdesk to determine if an email is fake or not. We thought it’d be helpful to put together a short instructional video to help you identify some common signs that an email is a phish or fake email....
Netflix phishing scam: Don’t take the bait
used with permission from FTC.gov., by Colleen Tressler Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information...
Check email header information for signs of spoofing
Think about this scenario: A friend tells you that they received a message from your email address that wasn’t really sent from you. They think you’ve been hacked and your account is sending malicious emails to friends. How do you know if your email address...
Fend off cybercriminals with better business security practices
used with permission from Tektonika (HP), by Karen Gilleland “Gimme the dough—or you’ll never see your files again!” In this scenario, the thug in the mask is ransomware, and it’s only one of the ways cybercriminals attack businesses—which are often left vulnerable...
How to avoid a Bitcoin blackmail scam
used with permission from FTC.gov., by Cristina Miranda “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these...
Tackle internet safety today – it might be easier than you think
used with permission from Tektonika (HP) Information security breaches are becoming so commonplace, they’re seen as the cost of doing business—but they don’t have to be. Promoting internet safety and device security isn’t as hard as it might seem. By making small...
Google Docs phishing attack
As some of you may already be aware of, there has been a large scale email phishing attack that impersonates a Google Docs request. Although it may appear that the email requests are coming from a known sender or domain, they are using techniques to spoof those...