Account Take Over

10 - February 2020

The Five Stages of a Phishing Attack

Phishing attacks lure unsuspecting people to click on links that lead to realistic-looking fake pages (spoof websites). The goal: stealing the victim’s login credentials. This attack…

LEARN MORE
31 - October 2019

Poisoning The Well: Deceive And Disrupt The Phishers

To shift the balance of power and finally gain an advantage over phishing schemes, defenders need to disrupt the economic advantage of the attacker. This means…

LEARN MORE
17 - October 2019

Déjà Vu All Over Again: Phishing Scheme Targets Presidential Candidates

The continued attempted hacks against computers used by the staff for political parties and citizen groups at the core of our deliberative political system is increasingly…

LEARN MORE
7 - October 2019

YouTube Data Breach Highlights 2FA Vulnerability And Victim-Blaming

The phishing scheme aimed at top YouTube content creators is a real-time case study in how these attacks are evolving and becoming more sophisticated. It also underscores that…

LEARN MORE
27 - March 2019

The Economic Impact Of Cybersecurity

As the world grapples with growing consumer privacy concerns and related regulations, combined with daily, costly data breaches, cybersecurity skills are in more demand than ever.…

LEARN MORE

FOLLOW OUR Account Take Over

CONTACT US

Phone Number - (877) 669-8883