<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

W-2 Phishing Scam Happening Through Emails

Posted by Steven Lai on Fri, Mar 24, 2017

 Scam requests for W-2's

Numerous scams have been happening through emails. The scam consist of requests for W-2 information from individuals. The scam emails are designed to look like they was sent from a CEO or other excuitive member, asking for employees W-2 information.  The FBI and IRS have posted warnings about this criminal activity and have stated the volume of the scam emails have increased drastically. 

 

W2_phishing_hook_scam

Already Victimized

Read More

Topics: Data Security, cybersecurity, social engineering, email security, Phishing

Security Definitions for Beginners

Posted by Focus Solutions Engineer on Tue, Mar 08, 2016

Zero Day Exploit – A recent flaw discovered, that is leveraged by a hacker or “threat actor” before a patch or preventative measure can be made available by the manufacturer of the system or software. The bugs or flaws are unknown, go on undetected, and can continue to be exploited for many weeks, months or potentially years. Some security researchers will responsibly report such flaws to the company responsible, giving them enough lead time to pinpoint and resolve any such issues with software updates before going public with the information. Keep up with system patches, and make sure to look for network and traffic anomalies in your security management consoles.

Read More

Topics: Phishing, IPS, Next Generation Firewall, Security, Security Definitions, Threats, Zero Day Exploit