Cloudjacking and Cryptojacking Are Leaving Cloud Owners in the Dark

As cloudjacking is becoming more widespread, it’s being combined with cryptojacking to mine cryptocurrency undetected. Cloudjacking is the act of stealing processing and storage from someone else’s cloud account, and cryptojacking is the act of forcing the stolen computer to mine cryptocurrency. Together, the two hacking methods can be used to mine cryptocurrency for free, while the cloud account owner unknowingly pays the bill—often for weeks or months.

Read more

Cloudjacking and Cryptojacking Are Leaving Cloud Owners in the Dark

As cloudjacking is becoming more widespread, it’s being combined with cryptojacking to mine cryptocurrency undetected. Cloudjacking is the act of stealing processing and storage from someone else’s cloud account, and cryptojacking is the act of forcing the stolen computer to mine cryptocurrency. Together, the two hacking methods can be used to mine cryptocurrency for free, while the cloud account owner unknowingly pays the bill—often for weeks or months.

Read more

Phishing Scams Are Growing Up: New Email Attacks Surface

Look out! Just when you thought you knew what to click on in your emails, another threat emerges. Based on our awareness campaigns, users now know to “look for the padlock” in the browser bar, and to “hover over a link” before clicking on it in an email. Those suggestions do help to some extent, but now the bad guys have introduced even more insidious approaches.

Read more

Phishing Scams Are Growing Up: New Email Attacks Surface

Look out! Just when you thought you knew what to click on in your emails, another threat emerges. Based on our awareness campaigns, users now know to “look for the padlock” in the browser bar, and to “hover over a link” before clicking on it in an email. Those suggestions do help to some extent, but now the bad guys have introduced even more insidious approaches.

Read more