Internet information thieves are preying on our inattention while reading emails.
Online criminals know we are all busy, and that we often aren’t focused on what we are opening, reading and where we are clicking. They take advantage of that inattention by forging email messages to look like they've come from Apple, Facebook, and Amazon, along with well-known banks, payment services, retailers, and even government agencies such as the IRS and the Social Security Administration. Even more dangerous are messages that appear to come from a trusted individual and include personal details—often targeted at executives and company managers.
Generally speaking, these attacks are called phishing. And they cost businesses hundreds of millions of dollars every year.
The goal, of course, is to prompt you to click a link in the message and visit a malicious website. That site usually continues to masquerade as being run by a company or organization you trust. Its aim is to sucker you into revealing confidential information by asking you to log in, pay for a product or service, or fill out a survey. The site — or an attachment in the email message — might also try to install malware. Although macOS is quite secure, it can still be affected if you approve certain security prompts.
Here’s how you can help identify potential phishing attacks. Read More...
Here is how the scam worked:
The scammers first did some research on the company and found the names of the President and Controller, most likely using the company’s website or LinkedIn profile. Though email addresses for these individuals were not listed on the website, most companies use a standard naming convention for email addresses and guessing a user’s email address is not difficult. Read More...
Kerio Connect Offers Features, Function and Reliability in an Affordable Mail Server
The days before email became essential to doing business seem like a theme for a documentary on the History Channel. Gone are the days when businesses relied solely on snail mail and phone calls to communicate. Email is a critical component to business success and the ability for your mail server to multitask is just as important. Ask yourself a few questions to determine if your email server is adequately meeting your current needs.
- Can you synchronize email messages between your phone and computer?
- Is the endless barrage of spam making it hard to find the real messages sent to you?
- Can you see and update the same list of contacts on your phone and your computer?
- Are you able to send and receive meeting invites that sync with your calendar?
- Can you easily set an out-of-office message and schedule it to turn on and off by itself?
Phishing is an email scam that uses well known companies to trick you into giving sensitive information. Here’s how it works: you get an email for a company, such as your bank, saying they need you to immediately sign into your account and provide a link for you to do so. Once you click on the link, you are taken to a website that looks like that of the trusted site. If you provide your login credentials, they are saved and used to access your account. If you receive an email requesting sensitive information, it is probably a phishing scam. Read More...
It is completely cross platform and works on Macs, PCs and mobile devices. This means everything is integrated even if Windows users are using Outlook and Mac users are using Apple Mail, Address Book or iCal. Kerio Connect can be run on your own internal server or hosted by CranstonIT in the cloud. Read More...