TV Licencing – Phishing Email

We have been made aware of a phishing emails currently being banded around the internet. These emails are designed to gain financial information. You can safely delete this email. Please see copy of email below; Email Example Subject: Expires on 11 November 2018 —————————————————– Admonitory: there is no licence at your address —————————————————– As there is no updated BBC TelevisionLicence …

Email Scam – Pornography, Sextortion

Description People are being sent horrifying messages threatening to post video of their most intimate moments on the internet. What’s more, the messages are shockingly believable: they appear to include secret information about the recipient that suggests the threats are real. But in fact the messages are a scam. And they seem to be relying on the vast number of …

Email Security

Redjelli has noticed an increase in the number of spam and phishing  emails to our clients, Redjelli has taken technical steps to mitigate against these malicious emails but to ensure that your systems are not affected your vigilance is required when using your email system.  Please familiarise yourself with the security  guidance below to ensure that your computer systems remains functional.   Do …

Microsoft Phishing Email

PLEASE BE AWARE! The following phishing email is currently prevalent across the internet. This email is claiming to be from Microsoft and is utilising the Microsoft logo to try and gain your trust. Please DO NOT action this email. If you or any of you team members have carried out the request in this email, please contact us. You will …

Email Spoofing

Do you really know where that email came from? Email spoofing is when a sender’s email address has been forged to appear as though it was sent from someone, or somewhere, other than the actual source. Email spoofing tools are widely available, and criminals often use them as part of Phishing attacks. For example, an email can be spoofed to …

Phishing, Don’t take the bait

In the last year, phishing attacks have seen a meteoric rise as attackers continue to refine tactics and share successful types of attacks. In particular, they’ve taken advantage of the malware-as-a-service offerings on the dark web in order to increase the efficiency and volume of attacks. In fact, 91% of cyberattacks and their resulting data breaches now begin with a …

Brutal Ransomware

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to give the best possible defense? This paper examines commonly …