Phishing

Ransomware-As-a-Service a Big Problem for Small & Large Businesses

July 12, 2021 / in Blog, Tech Essentials / by Zafar Khan, RPost CEO

We Predicted the Death of Ransomware in 2017. Oh, Time Machines. We first wrote about Ransomware attacks in Tech Essentials in 2017 – back when a Bitcoin was valued at $1800 (oh, the good old days). The crux of the article was that many victims were paying their ransom to the cyber perpetrators, but they did not have an easy way to track and reconcile who paid, and m [...]

World Class eSignature and Email Encryption Services

April 24, 2020 / in Blog, Electronic Signatures / by Zafar Khan, RPost CEO

Anatomy of Phishing in this Pandemic – Spearphising is Great, Whaling Best If you have money, savvy phisherman and whalers will find you. With most of the world hunkered down working from home, normal processes are disrupted, so this is a target-rich environment for scammers. They are lurking. Beware! There are many people all over the world falling for these phishing lures. With the US Government doling out trillions of dollars, these phisherman see dollar signs, t [...]

Secure Emails with Message level Encryption and one-time-passwords

September 06, 2019 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

End of Summer Phishing, Hooks Office 365 Users The phishermen are getting smarter, using better lures to catch ever smarter phish (in this case, you, as an Office 365, OneDrive, SharePoint, or Dropbox user). Armed with better grammar and embedding your company name and email address within the email and images, and further, using authentic OneDrive or Dropbox URLs to link to, these latest scammers are luring users into providing their username and passwords to the sca [...]

Uncover the Common Myths and Misconceptions Related to Email Security

May 28, 2019 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Your Friends Siri and Alexa Have Changed IT Security Your close friends Siri and Alexa may have done more to change how IT staff are re-inventing how they think about Internet security than years of tech tips and training sessions. In a Siri and Alexa world, we normal humans are trained to believe that what you need is a click or voice prompt away. Anything. And, it should just work. Never mind the thousands of Amazon human workers all over the world that [...]

Cyber Pirates Find Silver in Real Estate and Gold in Tech Invoicing

May 16, 2017 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Cyber pirates have found easy prey in real estate brokers, title agents and estate attorneys. Their emails are a treasure trove of information about pending transactions involving large wire transfers. Real estate buyers, eager to close the deal, blindly trust the email they receive and the advisors with whom they correspond. There are countless reports of home buyers who have wired their downpayment funds to cybercriminals posing as settlement agents, only to have the funds lo [...]

United Airlines and David Beckham — When Emails Leak

April 20, 2017 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

What do United Airlines and footballer David Beckham have in common? Disastrous leaked emails. In these recent cases, the leaked emails appear to be legitimate, though Beckham claims some of the leaked emails were “doctored.” But how do we know that leaked email messages discussed in news stories and tabloid columns are actually authentic? United Airlines’ PR Nightmare   United Airlines’ CEO Oscar Munoz appears to have dug himself into a deep hole [...]

Changing Trends in Cyber Security

May 05, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

In the past, for individuals and small businesses, cyber security was important to mitigate the inconvenience of spam, viruses that required restoring back-ups of corrupt files, and letters to credit bureaus to clear up identity theft issues. While painful, the cost of these was generally in the hundreds of dollars and perhaps a few hours of inconvenience. Today, we see a convergence of trends that is changing the dynamics of cyber security for individuals and small business [...]