Cybercrime and Social Media

Cybercrime and Social Media

Cybercrime and Social Media: What’s the Goal? Just as with a so-called “traditional” phishing campaign, these social media-specific cyberattacks employ the same tactics (phishing, ransomware, spam, malware). Some hackers even manage to take control of influencers’ official accounts to extract information from their followers in order to…

Increase in Internet searches on how to become a "hacker"

Increase in Internet searches on how to become a "hacker"

Internet Searches: Cybercriminals in Transition Cybersecurity professionals have reason to be concerned. In fact, in 2020, internet searches for information on how to hack have skyrocketed! The COVID-19 pandemic, lockdowns, remote work, the economic crisis, and rising unemployment are all reasons why millions of people are looking for potential new sources of income. Interest in…

What is DMARC?

What is DMARC?

Created in 2012 by major email service providers, DMARC (“Domain-based Message Authentication, Reporting, and Conformance”) is a protocol that prevents hackers from spoofing a person’s email address. More specifically, it acts on an organization’s domain name. The DMARC system identifies phishing emails or messages sent by someone who is impersonating…