MDaemon Technologies Blog

Phishing Email Posing as U.S. Dept of Treasury Spreads Malware

By Brad Wyro posted in malware, phishing

0 Comments

This week, we learned of a new round of malware being distributed via phishing emails claiming to be from the U.S. Department of the Treasury.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in antispam, Email How To, Email Security, malware, security, anti-spam, spear phishing, phishing, best practices, email security

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Avoid Being a Victim in Today's Massive Ransomware Outbreak

By Brad Wyro posted in DKIM, Email Security, malware, security, anti-spam, phishing, best practices, email security

0 Comments

 

As I was coaxing myself awake this morning with my usual jolt of strong coffee, I checked my favorite news sites & was informed of yet another ransomware attack. This one, which is believed to have originated from Ukraine, was first thought to be a variation of last year's Petya ransomware outbreak, but upon further investigation, it appears that today's malware is a new type - a worm that some computer experts are referring to as "NotPetya". This attack demands a smaller ransom (in comparison to other attacks) of approximately $300, and then begins to serve its primary purpose - to wipe files on the computer. According to researchers at Symantec, this attack used the same National Security Agency hacking tool, Eternal Blue, that was used in the WannaCry outbreak, as well as two other methods to spread the attack. According to information provided by this article on CNN, if you've installed all of the latest Windows patches, you should be safe from this particular strain of malware, however, by no means is this a reason to be complacent. Administrators and end users must still be mindful of safety precautions.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates