#BeSmarterThanAHacker

Don’t Let Cyber Attackers Win this Cybersecurity Month

Cybercriminals are always looking for new ways to commit their crimes. They use all kinds of methods to deceive victims. Phishing, smishing, vishing and other social engineering techniques are used to trick people into handing over sensitive information. As a global leader in mobile network security, Enea joins the Cybersecurity Awareness Month campaign by sharing some tips to help you avoid falling prey to attackers. Here, you can familiarize yourself with attacker techniques and social engineering tricks to look out for in phishing attacks. Don’t be surprised, be ready!

 

What to watch out for this cybersecurity month

Avoid Getting Scammed Over SMS

SMS phishing scams are always evolving, but here are three red flags you can look out for:

1. An offer that is too good to be true.

2. A sense of urgency.

3. A call to action.

Remember, always think before you click!

  • SMS phishing scams are always evolving, but here are three red flags you can look out for:

    1. An offer that is too good to be true.

    2. A sense of urgency.

    3. A call to action.

    Remember, always think before you click!

  • Always be wary of messages, emails and calls from numbers you don’t recognise that are saying they’re someone you know or a major organisation, and asking you to do something urgently.
    Simeon Coney
    VP of Business Development at Enea

What Happens If You Take the Bait?

SMS Phishing Attack Explained

Have you ever received a text message claiming to be from a financial institution informing you of a fraudulent transaction on your account, urging you to call a number, or access a page through a link? You are not alone. Fraudulent text messages are on the rise, with over 3.5 billion mobile users receiving spam texts on a daily basis. In this blog, we explain the intricacies of this type of social engineering attack.

Read Now

 

 

The Flaw in Our Phone System

How Your Phone Could Be Tracked Without Your Knowledge

Have you ever watched someone’s phone being hacked in a spy movie, and thought it might be a little far-fetched? Then this might come as a surprise to you. In a practical experiment, Derek Muller shows how your phone can be compromised without your knowledge – by hacking into his friend’s phone remotely. Find out how mobile phones can be weaponised for location tracking, call interception and more in this video by Veritasium.

Watch Video

 

 

Man with hood hacks mobile phone on computer

Scam Alert

Exploiting the Cloud: How SMS Scammers are using Amazon, Google and IBM Cloud Services to Steal Customer Data

This year, Enea’s Threat Intelligence Unit uncovered campaigns that exploit cloud storage services like Amazon S3, Google Cloud Storage, Backblaze B2, and IBM Cloud Object Storage. Threat actors are using these storage platforms to redirect users to malicious websites, with the ultimate objective of stealing their information. It all starts with a phishing text message.

Read Now

 

 

SMS phishing message with link to cloud storage

Think Before You Google

Unmasking Malicious URLs

For many of us, Google is a cherished side-kick, answering our burning questions in just a few clicks. We recognize and trust the brand. Unfortunately, this trust is being exploited by malicious actors trying to trick mobile mobile users by hiding behind seemingly legitimate URLs. The spam campaign involves the use of a legitimate Google address, with the spammer using a special technique to conceal the rest of the malicious URL.

Read More

 

Man searches URL on mobile phone