CCNA AWS Security Course info
  • Home
  • Certification
    • CISCO >
      • CCNA R S
      • CCNA Security
      • CCNA DC
      • CCNP R&S
      • CCNP Security
      • CCNP DC
    • Microsoft >
      • MCSA 2016
      • MCSE 2016
      • Upgrading to MCSA 2016
    • Cloud Computing >
      • AWS
      • Microsoft Azure
    • Juniper >
      • JNCIA Junos
      • JNCIS Security
      • JNCIS R S
      • JNCIS SP
      • JNCIP Security
      • JNCIP R S
      • JNCIP SP
    • Firewall >
      • CCSA
      • CCSE
      • Palo Alto 110
      • Palo Alto 210
    • f5 Big-IP
    • RedHat Linux
  • AWS
  • CCNA
  • Info
  • Networking Blog
  • Security Blog
  • Contact

"Network Learner- Feel the Technology"
-
industrial security blogs

Welcome to my Blog! If you are a working professional looking for CCNA, CCNP, Check Point, MCSA, AWS, f5 BIG-IP, Security etc Certifications or Up-gradation, please follow this site, I can help you to find out Best Training Institute in Kolkata,Fill the form or do call/whats-app to get Best Institute Information from me. -Network Learner-Feel the Technology@ Md Zak
( CCNA Training in kolkata / CCNA Course in kolkata )


This is the right place for advance Networking Security Knowledge, Want to feel the Technology just check all blogs. find out my Youtube Channel for more Interesting Video. In this blog you will get Information of best Training Institute. So check all Advertisement may be it help you.

Do Security Training and get Job | Click here to Know more

4) $23M Scam

9/16/2018

Comments

 
$23M  BIZ email scam!

A Nigerian host has been sentenced to 5 years in a US prison after making approximately $23million from basic wire fraud scams and identity thefts.
Picture
The host used a combination of clone phishing and wire fraud to extract money out of international businesses from Australia, America, United Kingdom and Africa.

What is the scam?
Clone phishing is a attack whereby a legit and previously delivered email (containing an attachment or link) has had its content taken and used to create an almost identical or cloned email. Thereby tricking the victim into thinking they are contacting the original intender.
Whereas wire fraud is a phishing-based attack complimented with a invoice sent to the victim. The attacker would include bank details for the invoice to be sent to as well as a malicious script, allowing the attacker to see the victim’s database.
Who is this scam artist?
He goes by the government name of  Onyekachi Emmanuel Opara, from Lagos (Nigeria), after admitting to wire fraud charged and identity thefts, he was extradited to the US and trialled this January.

How did they do it?
First of all, they would enlist themselves as an employee of the business, allowing them to act higher management of the companies in question. They would then ask the victim staff to wire over money to certain bank accounts-acting swiftly.

What can you do to protect yourself?

Keep up to date with the latest forms of cyber-attacks and have legitimate training sessions taking place for your staff. 

Author

Blog Written by my friend Muaaz Nadat who is from United Kingdom, he has great experience  in Security and other domain. Thank you Muaaz Nadat for your great blog.
Kindly like bellow page which is maintained by Muaaz Nadat :

https://www.facebook.com/ATOperation/ 

Comments

    Categories

    All
    Security

    RSS Feed

Powered by Create your own unique website with customizable templates.
  • Home
  • Certification
    • CISCO >
      • CCNA R S
      • CCNA Security
      • CCNA DC
      • CCNP R&S
      • CCNP Security
      • CCNP DC
    • Microsoft >
      • MCSA 2016
      • MCSE 2016
      • Upgrading to MCSA 2016
    • Cloud Computing >
      • AWS
      • Microsoft Azure
    • Juniper >
      • JNCIA Junos
      • JNCIS Security
      • JNCIS R S
      • JNCIS SP
      • JNCIP Security
      • JNCIP R S
      • JNCIP SP
    • Firewall >
      • CCSA
      • CCSE
      • Palo Alto 110
      • Palo Alto 210
    • f5 Big-IP
    • RedHat Linux
  • AWS
  • CCNA
  • Info
  • Networking Blog
  • Security Blog
  • Contact