Recent Blog Posts

Best Practices Against Phishing

Posted on: October 31st, 2023 by Wolf TG Admin
What is Phishing According to IBM, phishing attacks are fraudulent emails, text messages, phone calls or web sites designed to trick users into downloading malware, sharing sensitive information or personal data (e.g., Social Security and credit car ... Read Full Article

Common Phishing Attacks: Pharming

Posted on: October 17th, 2023 by Wolf TG Admin
As users become wiser to traditional phishing scams, some fraudsters are abandoning the idea of “baiting” their victims entirely. Instead, they are resorting to Pharming. This method of phishing leverages cache poisoning against the domain name s ... Read Full Article

Common Phishing Attacks: Smishing

Posted on: October 3rd, 2023 by Wolf TG Admin
Vishing is not the only type of phishing that digital fraudsters can perpetrate using a phone. They can also conduct what is known as smishing. This method leverages malicious text messages to trick users into clicking on a malicious link or handing ... Read Full Article

Common Phishing Attacks: Vishing

Posted on: September 19th, 2023 by Wolf TG Admin
Until now, we have discussed phishing attacks that for the most part rely solely on email as a means of communication. Email is undoubtedly a popular tool among phishers. Even so, fraudsters do sometimes turn to other media to perpetrate their attack ... Read Full Article

Common Phishing Attacks: Whaling Attacks

Posted on: September 5th, 2023 by Wolf TG Admin
Whaling attacks commonly make use of the same techniques as spear phishing campaigns. Here are a few additional tactics that malicious actors could use: Infiltrate the network: A compromised executive’s account is more effective than a spoofed e ... Read Full Article