Hook, line, and sinker: How to avoid looking ‘phish-y’

Top tips to help you avoid being caught receiving or sending phishing-looking emails. If you’re a regular reader of this blog, I suspect you live in a state of perpetual vigilance against targeted attacks such as phishing messages. You know that urgent sounding messages from sender addresses that don’t look right, especially if they include … More Hook, line, and sinker: How to avoid looking ‘phish-y’

Going on vacation? Five things to do before you leave

You’ve set up an out-of-office auto-responder and packed your stuff, but have you done all of your “homework” before you rush out the front door for that well-deserved time off? You’re probably taking the vacation to unwind, but it is certainly not the time to put cybersecurity on the back burner. On the contrary, being … More Going on vacation? Five things to do before you leave

Britain’s tax authority reports takedown of record 20,000 fake sites

Not unlike the Irish Revenue scams, that we’ve covered extensively, UK’s Her Majesty’s Revenue & Customs (HMRC) is “consistently the most abused government brand”, according to the National Cyber Security Centre (NCSC). The United Kingdom’s tax collection authority, Her Majesty’s Revenue & Customs (HMRC), initiated the removal of as many as 20,750 websites masquerading as the … More Britain’s tax authority reports takedown of record 20,000 fake sites

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege is a security strategy applicable to different areas, which is based on the idea of only granting those permissions that are necessary for the performance of a certain activity. In a recent conversation with our marketing analyst at ESET Mexico, Juan Carlos Fernández, we discussed a story about a scam carried … More The principle of least privilege: A strategy of limiting access to what is essential