Skip to main content

Phishing Email Targeting Apple Users

By July 15, 2013October 21st, 2021Blog

Good morning and welcome back to our weekly roundup of email security news! This regular publication is released each Monday to ensure you’re up to date on all the latest news surrounding email security. We’ll recap recent email exploits and give you the knowledge necessary to properly secure your proprietary information and confidential data. This is the July 15, 2013 edition providing information about the risk of auto-forwarded emails and much more.

Enjoy and, as always, be sure to check back next week!

“Cybercriminals are using the fake Apple sites to try and trick users into submitting their Apple ID credentials, which would enable the criminals to steal the users’s account login and access the victim’s personal data, information and credit card numbers stored on their iCloud and iTunes accounts.”
“Our intellectual property and sensitive data have been leaving the relatively safe confines of our internal network without adequate security precautions, all because users find it convenient to get their company email in their personal webmail accounts”
“(General Hawkins) points to the nearly finished rollout of a DoD-wide enterprise-level email solution.”
“The Guardian has continued with its promised leaks from NSA whistleblower Edward Snowden. The latest ones talk about data the NSA accessed at the 2009 G20 Summit and includes mention of accessing delegates email and phone calls. “
“The whole point (of spear phishing) is to intelligently target individuals or like-minded groups. Spear phishing banners, links and messages use personalized specifics and are designed with legitimacy in mind. Phishers do especially well if they can trick employees of a large company or members of a major organization and then capitalize on the administrative privileges of those users’ accounts.”
“The FBI has seen an increase in criminals who use spear-phishing attacks to target multiple industry sectors. These attacks allow criminals to access private computer networks. They exploit that access to create fake identities, steal intellectual property, and compromise financial credentials to steal money from victims’ accounts.”

“Marriott International says it is the latest victim of a phishing scheme designed to embed malware on the computers of unsuspecting users.”