NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

Are Your Users Getting Hooked?

What is one of the greatest and most common threats to your users?

What attack has infected networks, stolen millions of dollars, snatched password credentials and created the most chaos in modern history on business large and small?

Phishing.

Phishing attacks are by no means a new issue. But as modern technology and innovation has grown, so too have innovative ways criminals exploiting those innovations. As our societies and our businesses have gotten more connected, what have criminals done?
continue reading

When we first started bringing attention to phishing scams years back, they were pretty easy to spot. Criminals didn’t really think about how to actually sell their scam to their victims. Their emails were chock full of typos and their grammar was so bad that even your grandma could have read through the email and known that something was up!

Fast forward to today, criminals are using sophisticated tools to spoof messages and websites that actually look like the real deal. These phishing emails might even include official company logos that completely make them seem legitimate.

This is just one thing to watch out for. Criminals have also learned that subject lines with urgent messages get people’s attention. But there are a TON of things to be thinking about and looking for in phishing scams to make sure your users stay protected.
continue reading

Cybercrime is actually an extremely broad concept, consisting of a variety of different related offenses. One way to classify cybercrime is by looking at the role that a computer (or a network or device) can play within a criminal act. Mainly, that target of a criminal and a tool or weapon used to commit the crime.

Since illegal activity often involves computers both as targets and weapons, the distinction is flawed, but it makes it possible to provide a relative structured overview of the types of cybercrime.

This type of cybercrime comprises illegal activities that target computers, networks and/or devices. The term hacking is often used here to refer to crimes of this nature. Criminals often use computers for a variety of intents:
continue reading

Think of one thing at work that you wish you didn’t have to do today.

Is it something that requires a lot of concentration, but when you’re done you feel like it was a waste of time? Do you feel like a machine could probably do the work a heck of a lot easier than you having to invest an hour or several hours?

If we could get that task or set of tasks automated would that make life easier?

These are things criminals have been thinking about over the last few years and have actually been addressing.
continue reading

Plain and simple. We all (as humans) want to understand about things we do not know. Ferdinand Magellan, Lewis and Clark, even Neil Armstrong getting to the moon.

In security—especially cybersecurity—we have that same desire.

You see, the Dark Web—that mysterious part of the web that was designed to be completely anonymous—is the part of the web that most of us know nothing about and is where most of the threats on your business originate in one form or another. In security, we see all of the threats that either originate from discussions on the Dark Web or the aftermath (the loot from breaches and attacks) that ends up on sites within the Dark Web. But what we do not understand is what threats are coming.
continue reading

5 Easy Tips To Stay Safe Online

Are Your User’s Passwords On The Dark Web?

An anonymous hacking ring just released nearly 890 million credentials last week on the Dark Web.

True story. Cybersecurity experts were able to find pages on the nefarious Dark Web—the places on the web where people are anonymously selling and trading elicit materials and information.

Many of the websites and companies where the credentials originate—32 that we know of—have recently released press releases of cyberattacks and data breaches on their systems.
continue reading