Using natural language models to identify Business Email Compromise (BEC)
The latest articles and the latest Naked Security Live video – all in one place. Enjoy.
Machine learning models are immune to blandishments, threats, flattery and so – so why not set them against social engineers?
If a crook is already inside your email, occasionally adding in believable emails of their own… how on earth do you spot the fake ones?
It’s a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.
Twitter emailed business clients to tell them that their financial data may have been seen by the uninvited.
US states are being flooded by fraudulent unemployment applications in a scam run by a sophisticated cybergang.
3.5 million user logins for the MobiFriends dating app are being offered for free on a popular dark web hackers forum. This post appeared first on Naked Security Blog by…
The FBI has warned users of Microsoft Office 365 and Google G Suite hosted email about Business Email Compromise (BEC) scams. This post appeared first on Naked Security Blog by…
The FBI’s Internet Crime Report shows that business email comprise is the biggest money-maker for cybercriminals. This post appeared first on Naked Security Blog by Sophos Author: Lisa Vaas