Anti-spoofing controls – stopping the email impostors

By Euan Henderson Cyber Security Apprentice Three controls that should be configured are: Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM) Domain based Message Authentication, Reporting & Conformance (DMARC) records NCSC recommends the following: That all domains have the SPF and DMARC records in place, regardless of whether the domain is or is not used …

‘Good morning, I is Nigel from Microsoft – you has a virus!’

By Jason McNicholas Cyber Security Apprentice Phone scams are one of the many ways criminals steal money from people. It can be viewed as a form of vishing (voice phishing) since they are often masquerading as a legitimate organisation (usually a respectable authority such as; Microsoft or a branch of government). They could be claiming …

‘We have your password’

By Jason McNicholas Cyber Security Apprentice A Family member came to me saying that they received this Scam email from their own account which included her actual password, the Email however, went into spam. This is an example of credential stuffing for blackmail/extortion. If you receive an Email like this it’s extremely unlikely that they will …