Latest Political Cyber Fraud: Warren Endorses Sanders??!  No... It's Fake. (She Remains Neutral)

Posted by Greg Mancusi-Ungaro

Sat, Mar 05, 2016

2016 Elections Project Update:  On Monday, just before the Super Tuesday Democratic Primaries, this "NY Times" article made the rounds on social media:

It wasn't legitimate.  And it wasn't a parody.  It was a fraud, pure and simple. 

News of this fake article exploded on Monday, sending the NY Times and many other news organizations scrambling to disavow the article and have it removed from the web. Within a few hours, it was gone. But the damage may have already been done - the article was shared over 50K times, including 15K Facebook shares.  It was probably viewed by hundreds of thousands of people across all kinds of social channels.  Enough to swing an election? Possibly!   

Read More

Topics: scam, brand abuse, Reputation Management, Social Media Monitoring, cyber threats, impersonation, CISO, threatSMART, 2016 Elections

CyberAttack Exposes IRS Tax Returns

Posted by Greg Mancusi-Ungaro

Wed, May 27, 2015

irs-phish

Just a month ago, I wrote about an emerging critical cyber threat trend -- attacks centered on health care providers and health insurance systems.  These schemes are very lucrative for thieves because the loot, electonic health records, contains everything needed -- social security numbers, known addresses, phone numbers, relatives, payment preferences -- to create duplicate identities for individuals.  Just add the photo.

Read More

Topics: Security, data breach, hackers, security breach, cybercrime, cyber threats, impersonation, PII, Health Care

Twitter Trademark Abuse and Impersonation

Posted by Natasha Vadori

Fri, Jun 20, 2014

It is important for businesses to understand how managing their reputation can influence how a company is perceived by others. Reputation Management was originally a focus for Public Relation departments, but along with the advancement of technology, there has become an increase in number of places for your brand’s image to be affected. The internet, specifically social media sites, has become a major concern for an organization’s search results.

Read More

Topics: trademark issues, Social Media Monitoring, twitter, impersonation

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

 Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all