Welcome!

Cognitive Computing Authors: Liz McMillan, Pat Romanski, David Linthicum, Elizabeth White, Yeshim Deniz

Blog Feed Post

Spot Phishing Attacks Before They Catch You

Spot Phishing Attacks Before They Catch You
By: Leigh Goldie

If something fishy is going on with an email you received, you should definitely trust your intuition. Email phishing scams have become an easy way to lure recipients into sharing personal information or clicking on links that install harmful computer malware. The senders of these emails pretend to be reputable companies, requesting financial and personal information, or saying there is something wrong with your account. But their ultimate goal is to trick you into providing account information they will then use to buy things on their own or to steal your identity.

In conjunction with National CyberSecurity Awareness Month, Visa has provided a detailed example of a phishing scam email. Scroll over the blue arrows and it will reveal various examples of how this email is a scam. Emails like this usually present a problem with one of your accounts and ask you to update your information within a specific time period.

While your heart may begin to beat faster, the first thing you should do with this email is to not click, reply or call their given phone numbers. Clicking on their email link can lead you to files which will spread malicious software onto your computer. Instead, think of the company they represent. Find your actual account information by reviewing your monthly statement from that company. Call the company directly via the phone number you can find on their reputable site that you Googled for authenticity, or on their monthly statement, and ask them about your account. Also, tell them about the email you received and how you believe it is fraudulent.

Use OnGuardOnline.gov to learn more about the steps of phishing emails. They provide examples, suggestions on how to deal with phishing scams, and action steps you can take. Make sure you are always cautious when you open an email from someone you donʼt know – do not provide them with your personal information and never click on their links. Always visit their website by Googling it if it seems questionable. Investigate whether your email client or web browser offers anti-phishing features. Google Chrome, Firefox, Internet Explorer, and Safari already have them, but there are many other applications to help you. Make sure you are taking advantage of them. You are the only one that can spot phishing emails, so stay educated – otherwise you might get caught in the net.

Read the original blog entry...

More Stories By Hurricane Labs

Christina O’Neill has been working in the information security field for 3 years. She is a board member for the Northern Ohio InfraGard Members Alliance and a committee member for the Information Security Summit, a conference held once a year for information security and physical security professionals.

IoT & Smart Cities Stories
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
OpsRamp is an enterprise IT operation platform provided by US-based OpsRamp, Inc. It provides SaaS services through support for increasingly complex cloud and hybrid computing environments from system operation to service management. The OpsRamp platform is a SaaS-based, multi-tenant solution that enables enterprise IT organizations and cloud service providers like JBS the flexibility and control they need to manage and monitor today's hybrid, multi-cloud infrastructure, applications, and wor...
The Master of Science in Artificial Intelligence (MSAI) provides a comprehensive framework of theory and practice in the emerging field of AI. The program delivers the foundational knowledge needed to explore both key contextual areas and complex technical applications of AI systems. Curriculum incorporates elements of data science, robotics, and machine learning-enabling you to pursue a holistic and interdisciplinary course of study while preparing for a position in AI research, operations, ...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
I spend a lot of time helping organizations to “think like a data scientist.” My book “Big Data MBA: Driving Business Strategies with Data Science” has several chapters devoted to helping business leaders to embrace the power of data scientist thinking. My Big Data MBA class at the University of San Francisco School of Management focuses on teaching tomorrow’s business executives the power of analytics and data science to optimize key business processes, uncover new monetization opportunities an...
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud workloads, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and investigation, enabling better, faster protection. With more than 6,00...
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...