Vishing (voice phishing) is gaining in popularity as an attack vector. Attackers spy out internal company information, act as IT staff and instruct employees to execute programs or commit CEO fraud.
IT-Seal conducts vishing attacks as part of social engineering simulations. A phone call recording shows the fraudsters' tricks.
IT security needs the vigilant user - but ensuring real awareness in everyday life is a major challenge for many companies. Users feel overwhelmed by password changes, policies and alerts and often end up in a state of resignation. Learn how to avoid "security fatigue".
Social media poses a real threat for companies. Employees sometimes publish extensive information about themselves, their employers and internal structures. How threatened are you? Should you bring the topic closer to your employees once again? IT-Seal answers these questions with its analysis of attack potential.
The CEO fraud is a popular scam among online criminals, sometimes used to scam companies in the millions. The criminals forge e-mails or pretend to be your boss by phone and ask for urgent remittances. Business is booming, especially during the holiday season.
Spoofed e-mails, i.e. forging the sender address to the exact character, leave the recipient no possibility of detecting the forgery. The sender policy framework (SPF) allows you to define which servers are authorized to send emails from your domain. The aim is to reduce the risk of spam and phishing e-mails.Read more
Security is an abstract term. IT-Seal has developed a benchmark for security against cyber attacks that creates transparency: The Employee Security Index compares a test group with a system that is considered "secure" according to the current state of research. This provides an insight into the security culture, a standardised possibility of comparison and a basis for decisions on further measures.Read more
Social engineering attacks are aimed at exploiting you as a computer user. Criminals intend to infect computer systems or steal sensitive data. Xing and LinkedIn are popular destinations for collecting initial information. Learn how to protect your data with the right privacy settings.Read more
Spear phishing is considered one of the biggest cyber threats of 2018. How do criminals proceed to lure their target into the trap with tailor-made attacks? We explain what measures every internet user can take to make life difficult for the attackers.Read more
The free anti-phishing education game "NoPhish" makes it easy to learn how to handle phishing e-mails and the frequently contained URLs. The wide range of topics will certainly increase the knowledge even among users who have already dealt with this topic.Read more
The free add-on TORPEDO for Mozilla Thunderbird was developed by members of the SECUSO research group of TU Darmstadt. The tool promises quick and easy help to detect fake links in phishing e-mails: we have tested it for you...Read more
In recent years we have seen many politically motivated cyber attacks. Now the question arises: Will the election in Germany be affected by cyber attacks as well?Read more
The election campaign in the US in 2016 was truly a special one: besides the unexpected outcome, various parties used new technologies combined with social engineering methods to influence voters for the first time.Read More
The distribution of so-called Ransomware via e-mail by phishing attacks is not new, but still extremely dangerous for companies. The current wave of attacks "GoldenEye" reaches a remarkable level of professionalism, so that even well-trained and attentive users can become phishing victims.Read More