Phishing for Answers
Cybersecurity for every audience.
Not your typical cyber blog.
Welcome to Phishing for Answers, a site that provides information about cyber news, technology policy, and information security management.
This blog is intended to inform every type of reader, from experienced professionals to those with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.
#latamhackers: Week 5 - Expansion of Malware Overseas
Week 5 of our #latamhackers series discusses the expansion of regional malware to overseas operators. Today, we analyze how Latin American hackers create custom malware and then sell it to groups outside of the region. This series is a 5-week collection of posts about the most commonly observed techniques used by hackers in Latin America.
#latamhackers Series: Week 4 - Geographic Targeting
Week 4 of our #latamhackers series is all about geographic targeting. This week we discuss how hackers in Latin America exploit VPNs and other tools to target victims based on location. This series is a 5-week collection of posts about the most commonly observed techniques used by hackers in Latin America.
#latamhackers Series: Week 3 - Reliance on User Execution
Week 3 of our #latamhackers series is all about reliance on user execution. This week we discuss how hackers in Latin America tend to rely on user execution to spread malware. This series is a 5-week collection of posts about the most commonly observed techniques used by hackers in Latin America.
#latamhackers Series: Week 2- Commodity Tools
Week 2 of our #latamhackers series is all about commodity malware. Today, we analyze how Latin American hackers rely on publicly available tooling and malware to exploit victims. This series is a 5-week collection of posts about the most commonly observed techniques used by hackers in Latin America.
#latamhackers Series: Week 1 - Phishing
In the spirit of Cybersecurity Awareness Month, Phishing for Answers is launching its #latamhackers series. This is a 5-week series of posts about the most commonly observed techniques used by hackers in Latin America. Week 1 is all about phishing - find out how phishing in Latin America compares to the rest of the world!
Your Social Media Account Was Hacked - Now What?
Politicians and high-profile celebrities are not the only ones who have had their social media accounts hacked - it can happen to any user! Recent research has shown that cybercriminals are increasingly targeting social media accounts to exfiltrate data and find other users to exploit. But what should you do if you become a victim? Find out more about which social media platforms are most often targeted, what steps to take if your accounts are hacked, and how to prevent it in the future.
How to Stay Cybersafe During the Holidays
‘Tis the season…to make cybersecure decisions! As people prepare to take vacations, spend time with family, and eat delicious treats, it is crucial to remember that cybercriminals are not taking a break. In fact, cyber attacks actually increase during this time of the year. Learn more about how you can stay cybersafe during the 2021 holiday season.
5 Things You Should Know about Social Engineering
Not all cyberattacks involve hacking, sometimes it just involves human deception. Social engineering seeks to exploit user psychology to gain access to valuable information. Read 5 important characteristics of social engineering attacks - what they look like, how they trick users, and ways to avoid becoming a victim.
Trojan Malware: A Bank’s Worst Nightmare
Between June and August 2021, a Trojan malware attack compromised the accounts of many banking customers in Mexico. The attackers stole user credentials, accessed their sensitive data, and even completely emptied some of the accounts - all without being detected. How did this malware execute such a devastating attack? Learn more about the exact methodologies used by these cybercriminals, as well as how financial institutions and their customers can work together to increase the security of online banking activities.
#howitworks: Virtual Private Networks (VPNs)
This week’s #howitworks post discusses virtual private networks (VPNs). Learn more about how VPNs encrypt and secure internet connections, some VPN best practices, and how VPNs can help travelers Netflix and chill from any location. This post is the final part of this year’s #howitworks series, which aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
7 Things You Should Know about Malware
Slow web browsing, annoying pop-up ads, suspicious downloads…these could be an indication that your device has been affected by malicious software (malware). Read more to learn 7 important characteristics about malware - what it is, how it spreads, and what we can do about it.
Why Do We Receive So Many Spam Calls and Texts?
Have you noticed an increase in spam calls and text messages? Wondering how to stop them? Read more about why spam calls are becoming so widespread, how callers get your phone number, and what you can do about it.
How Ghana Saved a Global Conglomerate from a Cyberattack
When global shipping conglomerate fell victim to one of the world’s worst cyberattacks, the company’s entire network was on the brink of permanent damage. Until a power outage in Ghana saved everything.
#tbt - Why Analog Systems Are Still Relevant
Are we too dependent on technology? Find out how reverting back to older systems can help decrease this dependency and improve cyber resilience.