Election Scams
DefenseStorm Blog
by
1M ago
With election season beginning to ramp up, it’s important to be aware and prepared for the barrage of phishing, smishing, vishing, and other “ishing” scams and campaigns that are sure to follow. Just this weekend, I received multiple texts related to voting and polling, so let’s explore a few of the common scams and tactics that bad actors will try to leverage to obtain your personal information ..read more
Visit website
Fraud Squad: Love, Lies and Deception: A Romance Scam
DefenseStorm Blog
by
1M ago
With the rise of online dating and social media, millions of people flock to digital platforms to find love. But from behind the protection of a computer screen, scammers exploit the most vulnerable people seeking romance and relationships, ultimately leaving the unsuspecting victim with a broken heart and an empty bank account ..read more
Visit website
The Rise of Banking Trojans in Rogue Mobile Apps
DefenseStorm Blog
by
1M ago
Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. As investment from fast-moving threat actors continues to increase, traditional security practices are unable to keep up ..read more
Visit website
New GRID Active Risk Assessment Functionality – Exception Tracking and Reporting
DefenseStorm Blog
by
2M ago
DefenseStorm has recently updated its GRID Active Risk Assessment with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution with GRID Active Risk Assessment Exceptions ..read more
Visit website
Fraud Squad: The Tech Support Scam That Cost a Senior Citizen Her Life Savings
DefenseStorm Blog
by
2M ago
Technology is advancing at an unprecedented pace, and even the most tech-savvy individuals can find themselves in need of assistance to remain connected and productive. Unfortunately, with the increased demand for tech support comes a rise in fraudulent activity exploiting this important service. Senior citizens are the most vulnerable group because they are more likely to seek help in navigating the complexities of technology ..read more
Visit website
New GRID Active Governance Program and Reporting Functionality – Linking Dashboards to Task Schedules
DefenseStorm Blog
by
2M ago
DefenseStorm has recently updated its GRID Active Governance Program with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution.  Organizations now can link dashboards to task schedules for scheduling and documenting report reviews ..read more
Visit website
The Importance of Asset Management
DefenseStorm Blog
by
3M ago
Insights from the desk of Chief Information Security Officer, William Wetherill ..read more
Visit website
PSA: Apple’s Name Drop Feature
DefenseStorm Blog
by
3M ago
Apple just rolled out a new default feature for iPhone and Apple watch that allows nearby users to share contact information with one another.  This feature has sparked some concern in online social communities and even prompted law enforcement agencies to release statements and privacy warnings over the last few days due to the concern that people could “drop” information on another user’s phone at random, which seems scary ..read more
Visit website
DefenseStorm releases User Behavior Analytics (UBA) model in GRID Active Fraud Detection
DefenseStorm Blog
by
3M ago
Powered by machine learning to help better proactively detect fraud, financial institutions can monitor suspicious non-monetary activities for individuals to complement rules-based approaches and detect fraudulent activities ..read more
Visit website
Holiday Fraud Delivery Notification Scams: “You have a package for delivery!”
DefenseStorm Blog
by
3M ago
..read more
Visit website

Follow DefenseStorm Blog on FeedSpot

Continue with Google
Continue with Apple
OR