AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

Recent Bite-Size Posts

5 ways to prevent tailgating in your company

You might not consider tailgating when developing your cybersecurity strategy, however it’s a form of social engineering which takes place in the physical world. It can be a tricky problem to tackle, but there are a few solutions.  What is tailgating? Tailgating is...

Should your business be using a VPN?

Virtual Private Networks (VPN) have been used by big international companies for years. But, as VPN services become more affordable and easy to use, businesses of all sizes can now use them to enhance online security.  What is a VPN? A VPN is an advanced...

How to protect yourself from evil twin attacks

Evil twin attacks usually occur when using public WiFi. With more people working remotely - perhaps at cafes or libraries - the chances of it happening increase. However, it’s not only public WiFi that can be duplicated, your company's guest network can too. This...

How can businesses tackle the spread of misinformation?

The effects of fake news aren’t limited to politics. Disinformation from rumours and coordinated campaigns can threaten companies' reputations and profitability, and even influence financial markets.  For example, conspiracy theories around the effects of 5G led...

The 2020 US election: How fake news was used to influence people

Fake news was, unsurprisingly, a concern during the 2020 US presidential elections. Fake news is 70% more likely to be shared than real news and in the run up to the 2016 election, it accounted for 6% of all news.  Fake news about voter fraud was widely spread...

3 types of disinformation scams to look out for

Disinformation is prevalent online - particularly on social media - and is often designed to manipulate you into giving away something valuable. Here are three recent examples of how scammers have used disinformation. 1. Charity-based scams As we touched upon in a...

How scammers exploit fake news on social media

Social media offers many opportunities for scammers to make money. And, they have few concerns about exploiting tragedy. For example, the current war in Ukraine has seen many con artists asking for ‘donations’. TikTok makes it easier to spread fake news Whilst scams...

Why do you need more than password protection?

We all know that we have to use passwords to protect our accounts at home and work. But, on their own, how much protection do they offer? Many people reuse passwords or have multiple applications under one account (e.g., Google products).  Not you, of course,...

Four common WhatsApp scams and how to avoid them

WhatsApp is one of the most popular apps with over 2 billion users globally. So it’s no surprise that it’s become a target for fraudsters. In 2021 alone, 59% of Brits reported receiving a message-based scam, 13% of which were via WhatsApp.  Here are some common scams...

Don’t let remote working make you vulnerable

Business Email Compromise (BEC) is not new; however, fraudsters have changed their tactics in recent years. Rather than targeting C-suites and Executives, they’ve now cast their nets to the broader business ecosystem. And, the rise of home working has made their work...

Beware the deepfake con artists

Beware the deepfake con artists   From the fun Tom Cruise impersonation, to the more concerning fake Nancy Pelosi video, “deepfakes” have gained a lot of attention. But what are they and why could they be harmful to your business?   How are deepfakes made?...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report