<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spear-Phishing Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/spear-phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/spear-phishing/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Wed, 04 Oct 2017 09:31:58 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Spear-Phishing Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/spear-phishing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Yahoo breach &#8211; Round 3 &#8230; Billion! ?</title>
		<link>https://www.l2cybersecurity.com/yahoo-breach-round-3/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Oct 2017 09:31:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=931</guid>

					<description><![CDATA[<p>If you had a Yahoo!, BT or Sky e-mail account (also AT&#38;T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.It&#8217;s a record that will be hard to beat, but they have now confirmed that all 3 BILLION Yahoo! based customers had their account information stolen.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">Yahoo breach &#8211; Round 3 &#8230; Billion! ?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-932" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-We-did-it-150x150.jpg" alt="yahoo! breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-We-did-it-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/10/Yahoo-We-did-it.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />If you had a Yahoo!, BT or Sky e-mail account (also AT&amp;T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.<span id="more-931"></span>It&#8217;s a record that will be hard to beat, but <a href="https://www.oath.com/press/yahoo-provides-notice-to-additional-users-affected-by-previously/">they have now confirmed</a> that all <span style="text-decoration: underline;"><strong>3 BILLION</strong></span> Yahoo! based customers had their account information stolen. They are all being contacted now with information on the compromise.</p>
<p>&nbsp;</p>
<blockquote><p>Subsequent to Yahoo&#8217;s acquisition by Verizon, and during integration, the company recently obtained new intelligence and now believes, following an investigation with the assistance of outside forensic experts, that all Yahoo user accounts were affected by the August 2013 theft.</p></blockquote>
<p>That&#8217;s an absolute world record number of accounts to have been compromised. Only Google or Microsoft would have more e-mail accounts than Yahoo!</p>
<p>As <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">I&#8217;d indicated at the time</a> of the first Yahoo breach notice, they also provide e-mail services to a number of other internet service providers such as BT and Sky in Ireland and the UK. These accounts will have been compromised too. I provided a <a href="https://www.l2cybersecurity.com/yahoo-already-had-world-record/">number of helpful tips</a> in my second Yahoo! post when they went and set the previous world record for accounts breached, I&#8217;ll include them again here for you.</p>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Two-factor authentication:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This will absolutely improve your on-line account protection by a huge amount. Particularly if you use an authenticator app like <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en">Google Authenticator</a>. There is even an entire <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, because it is that good!</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Use unique passwords on every site:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yes, we know it’s difficult to do this, but this is where the bad guys win. If you haven’t received the <a href="https://www.l2cybersecurity.com/security-awareness-training/">excellent training</a> available from <i><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a></i>, then use a Password manager.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Check auto-forwarding settings:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If the evil doers have compromised your e-mail account, they may have done this in a very sneaky fashion by logging on once, and setting your account to automatically forward all received e-mail to them. This is a particularly stealthy way for them to spy on you. Go to your account settings now and check if there is any forwarding of mail going on.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Don’t save welcome e-mails or password resets:</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">When you sign-up to services or accounts, you provide your e-mail address and that service or account sends you a “are you the person who just signed up to us” type e-mail, followed by a “welcome to our service” type e-mail. You might also have forgotten your password for such accounts and requested a password reset which they helpfully send to you in an e-mail. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well you really should delete all such e-mails after you have read them, because these will lead the evil doers to these accounts, where they will do another password reset and then compromise that account too. If they don’t know what services you subscribe to, they can’t do anything to them.</span></p>
</div>
<p>Lets be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">Yahoo breach &#8211; Round 3 &#8230; Billion! ?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scary new way to have your GMail password and account stolen.</title>
		<link>https://www.l2cybersecurity.com/gmail-password-stolen/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 18 Jan 2017 11:43:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=467</guid>

					<description><![CDATA[<p>This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ? So what happens is you receive an e-mail from somebody you know, who also had a GMail (note the emphasis on had).  This e-mail will have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft" title="GMail password" src="https://1.bp.blogspot.com/-7Vym9Gnn-zQ/WH9LZ13c8oI/AAAAAAAABFg/zZCh8CPJptAEG0tnmvSbwKCYH18Fu5n0QCLcB/s320/download.png" alt="Scary new way to have your GMail password and account stolen" width="316" height="159" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what happens is you receive an e-mail from somebody you know, who also <b><i>had</i></b> a GMail (note the emphasis on had). </span></p>
</div>
<p><span id="more-467"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This e-mail will have a subject line of a previous e-mail conversation that you have had with that person and also, what appears to be an, attachment that had been attached in an earlier e-mail in that conversation. So far this e-mail is looking <u data-blogger-escaped-style="font-weight: bold;">EXTREMELY</u> legitimate.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That attachment, is actually an image in the e-mail with a link embedded in it and if you click on it, it will take you to, what appears to be, the GMail log-in screen, as follows:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s1600/gmail-data-URI-sign-in-page.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s320/gmail-data-URI-sign-in-page.png" width="275" height="320" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Being asked to log-in like this would certainly trigger an alert in my mind that something was up. I would immediately check to see where this password page has come from, so I would look up at the address bar of the browser. This is what you would see:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" width="526" height="49" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;"> So that looks OK doesn&#8217;t it? <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> (nice and secure site) <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">accounts.google.com</span> (legitimate address) and the e-mail came from somebody I know, from an e-mail conversation I have had with them, that had an attachment, which was here again in this new e-mail. <b>All very believable! </b>So let me enter my GMail ID and password and &#8230; you&#8217;ve now given the hackers your credentials.</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Within minutes, they will have taken over your GMail account and will be sending this nasty surprise e-mail to your friends, family and colleagues.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So how do I know it&#8217;s not a legitimate GMail login screen? Let&#8217;s take another look at that address bar:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" width="528" height="52" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That first part of the address (highlighted) looks <i data-blogger-escaped-style="font-weight: bold;">a bit odd</i>, don&#8217;t you think? It is very odd. It actually has a verrrrrrrrry long string of text, which stretches off beyond the end of what you can see in the address bar that executes a script, which brings up that log-in page.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Also, if you know your secure websites, you know that where there is proper <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> there is also a green padlock symbol like this:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><a href="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s1600/Capture.PNG" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s320/Capture.PNG" width="320" height="35" border="0" /></a></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That gives a high degree of confidence that the site is legitimate and properly secure.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Here&#8217;s the best possible protection for your GMail password</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve said this numerous times. I tell everyone I know, that they must set this up to protect their accounts. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">It is known by many names &#8211; Two factor authentication or Two step verification or Login approvals.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve a whole <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, so please have a read and please implement it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This protection, won&#8217;t prevent you falling for the scam outlined above. What it will do is prevent the bad guys from accessing your account, even though they have your GMail ID and GMail Password, they won&#8217;t have your smart phone and as such won&#8217;t be able to sign in as you.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Please implement Two factor authentication on all your on-line accounts. It really gives you the best possible protection.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">h/t to the folks over on <a href="https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/">WordFence</a> for the details on this.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Could the attempted theft of €4.3m from Meath County Council happen to your business?</title>
		<link>https://www.l2cybersecurity.com/meath-county-council-scammed/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 22 Dec 2016 09:23:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=471</guid>

					<description><![CDATA[<p>As was widely reported at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really. This attempted theft was facilitated by the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://4.bp.blogspot.com/-jkJnX039VCQ/WFq2YmKI0-I/AAAAAAAAA7U/12qdIiN6IHMdFP8yCP-LDHp6C8PmnL1ygCLcB/s1600/MeathCoCo.jpg" alt="Meath County Council" width="180" height="180" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As was widely <a href="https://www.irishtimes.com/news/ireland/irish-news/meath-county-council-confirms-attempted-cyber-attack-1.2910180">reported</a> at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This attempted theft was facilitated by the use of technology, but not necessarily the abuse of it. They&#8217;re no longer commenting about it now while the matter is investigated, so we&#8217;ll need to await the outcome of that before we know for sure.</span></p>
</div>
<p><span id="more-471"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">However this sort of theft is incredibly common and is known variously as CEO fraud or Business Email Compromise (BEC). Basically what the bad guys do, is send an e-mail or even a text message that appears to come from the CEO, the MD, the Head Honcho, the Big Boss. This e-mail/text is sent to somebody in the finance department and it instructs them to urgently transfer or wire funds to some account that is outside of the EU area. If the transfer was within the EU area, it can be recalled under SEPA regulations, but outside of the area the money can be a taken and never seen again. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If, in your business, you have a finance function (however big or small) that has a single person who is able to initiate a transfer of funds in any amount, on their own, then you could easily fall victim to this type of fraud. The thieves will have done research on your organisation and will know who is involved in the various departments and how you operate. This enables them to make their e-mail/text much more believable.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The FBI in the US have <a href="https://www.fbi.gov/contact-us/field-offices/phoenix/news/press-releases/fbi-warns-of-dramatic-increase-in-business-e-mail-scams">reported</a> that this fraud has occurred in 80 countries. From October 2013 to February 2016, there have been over 17,600 victims with total losses amounting to over $2.3 billion &#8211; that&#8217;s an average of just over $130,000 from each victim. This whole area is increasing rapidly and this will happen more and more.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what can you do to prevent it happening to you?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well quite simply, have the banking set-up, such that at least two signatories are required for every transaction, no matter the size. Then follow this up with a strict policy on how money transfers can be requested &#8211; particularly where the target account is new. If you are simply transferring to a known, established account (belonging to a vendor you deal with for example), then this should be OK (as long as there is a supporting invoice of course). However, if an e-mail requests the transfer of funds to an unknown account, then certain due diligence should kick in. For example, the CEO/MD/Whatever should be contacted by phone and additional verification sought. If the CEO cannot be contacted, then there should be no further action taken until they are reached. Very importantly, the CEO needs to acknowledge this policy and never subvert it, no matter what.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As mentioned earlier, the thieves will have done their homework on the company. The true story I tell during the <a href="http://www.l2cybersecurity.com/#ourservices">Internet Security Awareness and Safety Training</a> is about the finance director of a company receiving an e-mail from his boss asking him to urgently transfer funds to a client account in order to secure a new contract. As it&#8217;s for a new contract, it&#8217;s to go to a new account. Also the amount of the funds is just within the Finance Directors approval range for a solo authorisation. The CEO concludes the e-mail saying that he is just getting onto a long haul flight, so he will now be incommunicado for several hours.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The CEO was indeed travelling long haul that day, which the Finance Director knew, so it all looked fine, so he sets up the transfer on the system and is about to process it when a niggle hits him. There was just something that wasn&#8217;t quite right, so he chanced calling the CEO, who answered from the departure lounge at the airport. Of course there had been no e-mail sent by the CEO &#8211; it was all a hoax. But if the Finance Director didn&#8217;t have that niggle to call, the money was gone, never to be seen again.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So put a strong policy in place and make sure your staff are instructed in it and are never criticised for adhering to the policy. This last part if critical, because if they do get criticised, then the policy won&#8217;t get enforced and the risk of theft will become greater.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t ignore that e-mail from Lynda.com</title>
		<link>https://www.l2cybersecurity.com/dont-ignore-lynda-email/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Dec 2016 11:48:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Lynda.com]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=582</guid>

					<description><![CDATA[<p>I received two e-mails in recent days from online training provider Lynda.com customer care, this is because I have had two accounts with Lynda.com in the past. Both were set-up when they had a 30 day free trial offer, which I made use of. I&#8217;m one of the 9.5 million customers/former customers of Lynda.com who have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dont-ignore-lynda-email/">Don&#8217;t ignore that e-mail from Lynda.com</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;">
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I received two e-mails in recent days from online training provider <i>Lynda.com customer care</i>, this is because I have had two accounts with Lynda.com in the past. Both were set-up when they had a 30 day free trial offer, which I made use of.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I&#8217;m one of the 9.5 million customers/former customers of Lynda.com who have been contacted by them about a breach of their data security. They state that my contact information and courses taken were compromised, however they believe my password was not compromised. Here is the text of the e-mail:</span></p>
</div>
<blockquote><p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">We recently became aware that an unauthorized third party breached a database that included some of your Lynda​.com learning data, such as contact information and courses viewed. We are informing you of this issue out of an abundance of caution.</span></p>
<p>Please know that we have no evidence that this data included your password. And while we have no evidence that your specific account was accessed or that any data has been made publicly available, ​we wanted to notify you as a precautionary measure.</p></blockquote>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">So this doesn&#8217;t sound so bad. Right?</span></p>
</div>
<p><span id="more-582"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Nope. They have my contact information, so they have my name, e-mail address and mobile phone number. That means I could be targeted for <a href="https://en.wikipedia.org/wiki/Phishing">phishing</a> or even worse <a href="https://en.wikipedia.org/wiki/Phishing#Spear_phishing">spear phishing</a>. I tried to see if I could delete my Lynda.com account, but nothing obvious jumped out at me. I must check their online help and if there is nothing there, I will be contacting their &#8220;customer care&#8221; to try to get rid of these accounts.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">There were 55,000 people who have been contacted by </span><i data-blogger-escaped-style="font-family: &quot;Helvetica Neue&quot;, Arial, Helvetica, sans-serif;">Lynda.com customer care</i><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;Helvetica Neue&quot;, Arial, Helvetica, sans-serif;"> telling them that their passwords <u data-blogger-escaped-style="font-weight: bold;">have</u> been compromised and so Lynda.com have forced a reset of their password.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I actually don&#8217;t care about my password, the hackers would be welcome to it, as that is unique to my Lynda.com account, I would not have used it anywhere else. However, to use their terms, out of an abundance of caution I have changed my passwords on the two accounts I have, to some complete gibberish that even I won&#8217;t remember. I&#8217;ve stored them in my password manager.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">So what lessons can be learnt here:</span></p>
</div>
<ol>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Don&#8217;t re-use passwords &#8230; Get <a href="http://www.l2cybersecurity.com/security-awareness-training/">training</a> from <a href="http://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> or use a password manager.</span></li>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you sign up for free trials of services, but don&#8217;t continue with them, then have your account deleted/removed after you finished.</span></li>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If they don&#8217;t allow that (they may need to hold on to your e-mail address in order to make sure you don&#8217;t sign up again and again with the same e-mail), then try to have as much other personal information as possible removed from their site (name, address, date of birth, telephone numbers, etc.)</span></li>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Again, if you cannot remove the account, then before you stop using it, set the password to something completely nonsensical and don&#8217;t bother with it ever again.</span></li>
</ol>
<p>The post <a href="https://www.l2cybersecurity.com/dont-ignore-lynda-email/">Don&#8217;t ignore that e-mail from Lynda.com</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>There is a lot of variations in scam e-mail the last couple of days.</title>
		<link>https://www.l2cybersecurity.com/variations-of-scam-email/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 16:29:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=576</guid>

					<description><![CDATA[<p>I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ? In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people. I&#8217;ll run through three sneaky methods&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s1600/emailscam.jpg" data-blogger-escaped-style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s320/emailscam.jpg" width="320" height="240" border="0" /></span></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I&#8217;ll run through three sneaky methods that have been attempted on others over the last 48 hours.</span><span id="more-576"></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(1) Non-Delivery Receipt.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You know these e-mails. You get them when you send an e-mail, but you make a mistake and send it to an address which doesn&#8217;t exist or the mailbox has a size limit and your e-mail breaches that limit. This is the text of the Non-Delivery Receipt (NDR) in this instance:</span></p>
<blockquote class="tr_bq">
<pre data-blogger-escaped-style="background: rgb(238, 238, 238); border: 1px solid rgb(204, 204, 204); color: #222222; padding: 5px 10px;"><span style="font-family: 'courier new', courier, monospace; font-size: small;" data-blogger-escaped-style="font-family: &quot;courier new&quot; , &quot;courier&quot; , monospace; font-size: x-small;">Your message was not delivered due to the following reason(s):

Your message could not be delivered because the destination server was
not reachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.

Most likely there is a network problem that prevented delivery, but
it is also possible that the computer is turned off, or does not
have a mail system running right now.</span></pre>
</blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a ZIP file attached to the NDR, which of course has some nasty software that does not have your best interest at heart. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(2) A Microsoft Sharepoint Notification.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is a particularly sneaky one, as lots of larger organisations depend on Sharepoint&#8217;s sharing abilities.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The e-mail looks something like this:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s1600/sharepoint-spam.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" src="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s400/sharepoint-spam.png" width="400" height="295" border="0" /></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The Link in the body text would take you to a not particularly nice website. No doubt it might attempt to infect your computer. </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(3) Somewhat abusive attempt to get you to open the attachment.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Please be warned, there is a profanity ahead. I wanted to leave it in as it does generate something of a visceral reaction when you read it.</span></p>
<blockquote class="tr_bq"><p><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Subject: credit card charge from &lt;<i>your company&#8217;s domain name</i>&gt; </span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">What is this fucking charge on my card?</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I never visited or bought anything from &lt;</span></span><i data-blogger-escaped-style="color: blue; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;">your company&#8217;s domain name</i><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">&gt;.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached a screenshot of my statement.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I want my money back!!!</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached my card statement, please get back to me ASAP.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Thank you</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">company name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">person name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">phone</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">fax</span></span></p></blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a Word document attached to the e-mail, which of course has &#8230; nasty ransomware, which will scramble all of your files and leave you with a very bad day ahead. </span>?<span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><b></b></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>Conclusion</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I hope you noticed that I was pretty consistent in my recommended action &#8230; this is because it is from <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment #5</a> in our <a href="http://www.l2cybersecurity.com/the-ten-commandments/">Ten Commandments of Cyber Security</a>.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you wish to train your staff on how they can spot these type of e-mails, then have a read of <a href="http://www.l2cybersecurity.com/security-awareness-training/">this course outline</a> and contact us on the number or e-mail address at the end of that. We&#8217;ll be happy to discuss your training requirements and provide a quotation to cover same.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And lets be careful out there.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">H/T to the SANS Institute&#8217;s Internet Storm Centre @ <a href="https://isc.sans.edu/">https://isc.sans.edu/</a></span></p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Internet Security Awareness and Safety Training</title>
		<link>https://www.l2cybersecurity.com/security-awareness-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 02 Apr 2016 08:00:53 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=523</guid>

					<description><![CDATA[<p>Justification: Did you know that malicious software gets past commercial, enterprise grade anti-virus and e-mail filtering products on a worryingly regular basis? Firewalls and Anti-virus packages lure people into a false sense of security. While they do provide protection up to a point, if somebody opens an e-mail attachment that contains new malicious software, these&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Security Awareness and Safety Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-525 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/We-have-Dave-1-300x209.jpg" alt="Security Awareness Training" width="567" height="395" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/We-have-Dave-1-300x209.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/We-have-Dave-1.jpg 600w" sizes="auto, (max-width: 567px) 100vw, 567px" /></p>
<p><strong>Justification: </strong></p>
<p>Did you know that malicious software gets past commercial, enterprise grade anti-virus and e-mail filtering products on a worryingly regular basis?</p>
<p>Firewalls and Anti-virus packages lure people into a false sense of security. While they do provide protection up to a point, if somebody opens an e-mail attachment that contains new malicious software, these protections are effectively useless.<span id="more-523"></span></p>
<p>Cyber incidents, most notably Ransomware attacks have seen massive increases recently. 93% of contaminated e-mails in Quarter 1 2016 have carried a Ransomware payload (source &#8211; PhishMe Q1 2016 Malware review). 30% of people that receive evil e-mails open them and 12% of those that do, then open attachments or click on links (source &#8211; Verizon 2016 Data Breach Investigations Report).</p>
<p>These statistics highlight the fact that a significant weak link in any organisation, where it comes to using the internet and e-mail, are THE STAFF, but it&#8217;s not their fault as they may not have the necessary awareness of the risks.</p>
<p>The best protection to cover this gap are staff that are aware of what the threats are and how they manifest themselves. Once they are armed with the knowledge of what to look out for and how to protect themselves, they will be much less likely to cause a security breach.</p>
<p>The training which L2 Cyber Security Solutions provide is probably the most comprehensive on offer in the country. Other providers only focus on protecting e-mail usage, whereas we make the learner aware of other threats such as Malvertising, Social Engineering and WiFi Eavesdropping. We also have a well-received section on how to create unique and strong passwords, as well as covering mobile device best practices all in one course.</p>
<p>&nbsp;</p>
<p><strong>Programme Aims: </strong></p>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify threats on the internet, thus raising their awareness and to take steps to protect themselves from these threats.</p>
<p>&nbsp;</p>
<p><strong>Programme Objectives: </strong></p>
<ol>
<li>Learn what threats there are.</li>
<li>Spot Social Engineering in action.</li>
<li>Identify malicious e-mail.</li>
<li>Acquire safe web browsing practices.</li>
<li>Learn good computer &amp; mobile device practices.</li>
<li>Create strong and unique passwords.</li>
<li>Learn the <a href="http://www.l2cybersecurity.com/the-ten-commandments/">10 Commandments</a> of good Cyber Security.</li>
</ol>
<p>&nbsp;</p>
<p><strong>Programme Delivery: </strong></p>
<p>An interactive workshop, with individual and group participation in discussing Cyber Security.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Audience: </strong></p>
<p>People who have access to and utilise the internet and e-mail, whether for business or personal purposes, as part of their day-to-day activities.</p>
<p><strong> </strong></p>
<p><strong>Prerequisites: </strong></p>
<p>A basic understanding of Internet browsing and e-mail usage is a prerequisite.</p>
<p>&nbsp;</p>
<p><strong>Materials Provided:</strong></p>
<ol>
<li>A copy of the Security Awareness Training slide deck.</li>
<li>A copy of the exercise on good/bad e-mail.</li>
<li>Handouts with details on:
<ul>
<li>Password tips</li>
<li>Two Factor Authentication tips</li>
<li>The Ten Commandments of Cyber Security</li>
</ul>
</li>
<li>An evaluation sheet.</li>
<li>A follow up e-mail with a softcopy of the “Ten Commandments of Cyber Security”, which has clickable links to the relevant detail for each commandment on the L2 Cyber Security Solutions Blog.</li>
</ol>
<p>&nbsp;</p>
<p><strong>Contact us for more information:</strong></p>
<p style="padding-left: 30px;">Tel:      <span style="text-decoration: underline; color: #0000ff;">087-436-2675</span></p>
<p style="padding-left: 30px;">E-mail: <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Security Awareness and Safety Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
