emails

  • Blog

    New fake Ledger data breach emails try to steal crypto wallets

    A new Ledger phishing campaign is underway that pretends to be a data breach notification asking you to verify your recovery phrase, which is then stolen and used to steal your cryptocurrency. Ledger is a hardware cryptocurrency wallet that allows you to store, manage, and sell cryptocurrency. The funds in these wallets are secured using 24-word recovery phrases or 12…

    Read More »
  • Blog

    How to create rules for emails in Outlook for Windows 11

    In Outlook, rules allow you to automatically perform actions on incoming or outgoing emails based on certain conditions.  To create an Outlook rule, open Settings > Mail > Rules, click on “Add new rule,” configure the conditions and actions, and save.  You can also right-click an email, choose “Rules,” and select the “Create rule” option. These instructions apply to the…

    Read More »
  • Blog

    How to Mass Delete Emails on Gmail: Best Way to Declutter

    Having an email inbox full of read, unneeded messages can cause problems, especially in the Gmail mobile app. When you have thousands of emails, the Gmail app search function can get bogged down. In addition, all those obsolete emails require storage space, and soon, Gmail will force you to delete emails to free up storage or upgrade to a paid…

    Read More »
  • Blog

    Can you read your manager’s emails via Copilot?

    Microsoft has released a new collection of tools and a guide to fix security issues that have arisen around the way the company’s generative AI (genAI) Copilot assistant handles information. Namely, the tool’s indexing of an organization’s internal data can lead to the AI ​​assistant sharing sensitive information when it shouldn’t. A Microsoft employee familiar with customer complaints tells Business Insider:…

    Read More »
  • Blog

    Microsoft 365 Admin portal abused to send sextortion emails

    The Microsoft 365 Admin Portal is being abused to send sextortion emails, making the messages appear trustworthy and bypassing email security platforms. Sextortion emails are scams claiming that your computer or mobile device was hacked to steal images or videos of you performing sexual acts. The scammers then demand from you a payment of $500 to $5,000 to prevent them…

    Read More »
  • Blog

    Phishing emails increasingly use SVG attachments to evade detection

    Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection. Most images on the web are JPG or PNG files, which are made of grids of tiny squares called pixels. Each pixel has a specific color value, and together, these pixels form the entire image. SVG, or Scalable Vector Graphics, displays…

    Read More »
  • Blog

    Microsoft Exchange adds warning to emails abusing spoofing flaw

    Microsoft has disclosed a high-severity Exchange Server vulnerability that allows attackers to forge legitimate senders on incoming emails and make malicious messages a lot more effective. The security flaw (CVE-2024-49040) impacts Exchange Server 2016 and 2019, and was discovered by Solidlab security researcher Vsevolod Kokorin, who reported it to Microsoft earlier this year. “The problem is that SMTP servers parse…

    Read More »
  • Blog

    How to prevent safe emails from being sent to the Junk Email folder in Outlook

    To add a sender to the safe list in Outlook, open Settings > Mail > Junk Mail > Safe senders and domains, click on “Add safe sender,” the sender email address or domain, and click “OK.” Although the web version of Outlook does a pretty good job filtering unwanted emails, sometimes, it may not be able to distinguish between a…

    Read More »
  • Blog

    Is the Government Watching Me? Do They Read Texts and Emails?

    Is the government watching me? The unfortunate answer is yes. Government surveillance has become a global concern due to the ease digital technologies allow for espionage. Now, overreaching authorities in most countries infringe on citizens’ privacy by snooping on their web habits. Once upon a time, police had to get a search warrant to enter your home. Nowadays, your online…

    Read More »
  • Blog

    Google Pay alarms users with accidental ‘new card’ added emails

    Users were left alarmed this week on receiving unexpected emails from Google Pay stating that they had successfully “added a new card” to their Google account. The notification left users panicking and voicing their concerns on social media amid concerns they had been victims of a compromise. For many, the payment card being referred to had been issued years ago and presently expired, which…

    Read More »
Back to top button
close