AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The growing trend of current event-based phishing hacks

You might think you can spot a phishing email a mile off. But gone are the days of “Nigerian princes” asking you to wire them money. Hackers have become more sophisticated in their techniques. Their new tactics are clearly working as, according to CISCO’s 2021...

What’s warshipping and why should you be aware of it?

You might not consider warshipping - malicious hardware sent by post - when planning your cybersecurity strategy. After all, it uses one of the oldest methods of delivery available. Yet, it can pose a real threat to your network if successful.  Warshipping is on the...

Mobile payment app scams: 5 ways to avoid them

Mobile payment apps have made sending money easier, but they have also created a new opportunity for scammers.  One phishing scam that US authorities warn about involves the app Zelle - owned by a consortium of major banks including Bank of America, Chase,...

4 cybercrime trends to be aware of in 2022

Whilst any cyber attack is unpredictable, there are trends that hackers follow. Here are some of the main ones to be aware of in 2022.  1. Current event-based phishing attacks Phishing is not a new tactic, however attacks are becoming increasingly sophisticated....

How to protect yourself against revenge attacks

Imagine an ex-employee, who was fired by your company, takes revenge by hacking into your IT system. They’re able to do this because passwords of systems they had access to have not been changed. Within a few hours they could potentially do significant damage to your...

Recent Bite-Size Posts

The growing trend of current event-based phishing hacks

You might think you can spot a phishing email a mile off. But gone are the days of “Nigerian princes” asking you to wire them money. Hackers have become more sophisticated in their techniques. Their new tactics are clearly working as, according to CISCO’s 2021...

What’s warshipping and why should you be aware of it?

You might not consider warshipping - malicious hardware sent by post - when planning your cybersecurity strategy. After all, it uses one of the oldest methods of delivery available. Yet, it can pose a real threat to your network if successful.  Warshipping is on the...

Mobile payment app scams: 5 ways to avoid them

Mobile payment apps have made sending money easier, but they have also created a new opportunity for scammers.  One phishing scam that US authorities warn about involves the app Zelle - owned by a consortium of major banks including Bank of America, Chase,...

4 cybercrime trends to be aware of in 2022

Whilst any cyber attack is unpredictable, there are trends that hackers follow. Here are some of the main ones to be aware of in 2022.  1. Current event-based phishing attacks Phishing is not a new tactic, however attacks are becoming increasingly sophisticated....

How to protect yourself against revenge attacks

Imagine an ex-employee, who was fired by your company, takes revenge by hacking into your IT system. They’re able to do this because passwords of systems they had access to have not been changed. Within a few hours they could potentially do significant damage to your...

5 ways to prevent tailgating in your company

You might not consider tailgating when developing your cybersecurity strategy, however it’s a form of social engineering which takes place in the physical world. It can be a tricky problem to tackle, but there are a few solutions.  What is tailgating? Tailgating is...

Should your business be using a VPN?

Virtual Private Networks (VPN) have been used by big international companies for years. But, as VPN services become more affordable and easy to use, businesses of all sizes can now use them to enhance online security.  What is a VPN? A VPN is an advanced...

How to protect yourself from evil twin attacks

Evil twin attacks usually occur when using public WiFi. With more people working remotely - perhaps at cafes or libraries - the chances of it happening increase. However, it’s not only public WiFi that can be duplicated, your company's guest network can too. This...

How can businesses tackle the spread of misinformation?

The effects of fake news aren’t limited to politics. Disinformation from rumours and coordinated campaigns can threaten companies' reputations and profitability, and even influence financial markets.  For example, conspiracy theories around the effects of 5G led...

The 2020 US election: How fake news was used to influence people

Fake news was, unsurprisingly, a concern during the 2020 US presidential elections. Fake news is 70% more likely to be shared than real news and in the run up to the 2016 election, it accounted for 6% of all news.  Fake news about voter fraud was widely spread...

3 types of disinformation scams to look out for

Disinformation is prevalent online - particularly on social media - and is often designed to manipulate you into giving away something valuable. Here are three recent examples of how scammers have used disinformation. 1. Charity-based scams As we touched upon in a...

How scammers exploit fake news on social media

Social media offers many opportunities for scammers to make money. And, they have few concerns about exploiting tragedy. For example, the current war in Ukraine has seen many con artists asking for ‘donations’. TikTok makes it easier to spread fake news Whilst scams...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report