Posts

Malicious accounts conducting over 100,000 Business Email Compromise attacks in 2020: Barracuda

Image
  Malicious accounts conducting over 100,000 Business Email Compromise attacks in 2020: Barracuda Murali Urs, Country Manager – India, Barracuda Networks Barracuda Networks, a trusted partner and a provider of cloud-enabled security solutions, highlights the use of malicious accounts in business email compromise. Barracuda researchers have identified that 6,170 malicious accounts that use Gmail, AOL, and other email services have been responsible for over 100,000 Business Email Compromise (BEC) attacks in 2020 on nearly 6,600 organisations. Malicious hackers register email accounts with legitimate services to use them to conduct impersonation and business email compromise attacks. They carefully craft these messages and sometimes use the email accounts for only a short span to avoid detection or being suspended by email services providers. However, some hackers may temporarily abandon an account after initial attacks and then re-use them after a long ...

India may be part of Microsoft-TikTok deal

Image
  India may be part of Microsoft-TikTok deal: Report India is the biggest market for TikTok with more than 200 million users, however, it was banned along with 58 other Chinese apps by the government in June this year Microsoft   is chasing a deal to buy all of   TikTok ’s global business, including the viral   video   app’s operations in India and Europe, the   Financial Times   reported on Thursday, citing people with knowledge of the matter. One investor pegged the value of TikTok’s India business at as much as $10 billion. Microsoft   had said on Sunday   that it was in negotiations with   ByteDance , the Chinese owner of TikTok and the world’s largest startup, to explore a purchase of the TikTok service in the US, Canada, Australia and New Zealand. Since then, Microsoft has also pursued a plan that will include all countries where TikTok operates, the FT said. It does not operate in China, and such a deal would not extend to its Chi...

Microsoft Office the most targeted platform to carry out attacks

Image
Microsoft Office the most targeted platform to carry out attacks The number of attacks carried out using the popular suite has increased in the past two years as browsers become harder targets. Office files are now more popular than PDFs to deliver malware. ivanastar / Getty Iimages ...

Business email compromise attacks cost millions, losses doubling each year

Image
Business email compromise attacks cost millions, losses doubling each year Cybercriminals follow the money, and you need look no further than Toyota Boshoku's recent $37 million loss to see why many are turning to BEC scams.   In August 2019, someone at Japan's Toyota Boshoku Corp. received fraudulent payment instructions by email to send 4 billion yen (about $37 million) to a third party — which they did. "We became aware that the directions were fraudulent shortly after the leakage," the company disclosed in a statement . The company reacted quickly once it realized the fraud and took appropriate actions to recover their losses — a prospect experts believe unlikely. If it can't recover the money, it might be forced to restate its earnings forecast downward. That could have a negative impact on its stock price. This is just the latest high-profile example of business email compromise (BEC). "I've seen this happen at least 100 times ...

Why is Hotmail not as popular as Google?

Image
Why is Hotmail not as popular as Google? Hotmail was the foremost free email service when Microsoft bought the company in 1997. Microsoft bought them as a market share play for the 9 million user accounts they had at the time — for approximately $400M, or about $40 per user. This was back when the race was all about acquiring users, and what you would do with those users once you had them, in order to monetize your investment, was “a problem for later”. In other words: prior to the dot bomb. One of the major issues leading to the demise of Hotmail was that Microsoft spent a great deal of effort spinning its wheels. It did this in order to first put HTTP proxy servers in front of the FreeBSD servers upon which Hotmail was originally built so it would look like they were all running on Microsoft technology, and then replacing the FreeBSD servers on the back end so that they actually were running on Microsoft technology. Rumor has it — and I knew casually the p...