Top 10 summer security threats
The weather's been so poor many of you will have spent your days indoors on the web, so here are some security tips to keep you safe this summer.

It's supposed to be summer, even though the Brits haven't really seen much of one.
However, many people are still taking their holidays and the kids are off school, so it's a point in time when many people are using the internet.
However as IT PRO readers are aware, there are risks out there, which it is sensible to be aware of.
Here are the top ten security threats to watch out for this summer, according to Trend Micro, as cyber criminals look to take advantage of computer users trying to enjoy their holidays.
10 -Discount traps
This is about malicious advertisements that are usually too good to be true, which becomes more popular during the summer time as shoppers spend more time looking for good deals.
Malware writers try to lure users onto specially-made malicious websites. A recent Trojan displayed fake advertisements about the newly released iPhone, as well as a fake website of an online store.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"They are using a commercial argument as a social engineering attack," said Trend Micro senior ant-virus engineer David Sancho. "This is as old as malware."
Sancho added that users were still falling for it, mostly through very persuasive emails.
9 - Fake travel deals and airline notifications
As booking tickets online is more convenient than travel agencies, cyber criminals continue to create spam messages to phish for credit card numbers.
Similar to discount traps, cyber criminals here pose as airlines. In the summer, there is a lot of travel movement, with many people looking for cheap deals.
"In the summer time, you are more likely to go to that fake advertisement," said Sancho. "It's just pure social engineering."
Normally, when a user clicks on one of the links, they are redirected to a site that is malicious and where a user might think they are using the real website of an airline.
8 - E-commerce phishing attacks
This involves websites like eBay. Cyber criminals create crafty schemes to extort user information.
Sancho said that with big websites like eBay, criminals would want your login and password so they can pose as you.
"If you are a seller and somebody [by email] tells you they have a good summer offer for sellers, that sounds like a good eBay advertisement."
"If you click on the link, you are redirected to a fake website that looks like eBay but where you will actually give away your username and password."
Criminals could use your seller profile to sell fake products that they will never send.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
Exploitation of Docker remote API servers has reached a “critical level”
News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
By Solomon Klappholz
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024
Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
By Solomon Klappholz
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to know
News Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
By Solomon Klappholz
-
SOC modernization and the role of XDR
Whitepaper Automate security processes to deliver efficiencies across IT
By ITPro
-
Uncovering the ransomware threat from global supply chains
Whitepaper Effectively mitigate ransomware risk
By ITPro
-
The near and far future of ransomware business models
Whitepaper Discover how criminals use ransomware as a cyberweapon
By ITPro
-
Trend Micro security predictions for 2023
Whitepaper Prioritise cyber security strategies on capabilities rather than costs
By ITPro
-
'Potentially unsecured' SMBs are propping up an IT supply chain riddled with ransomware
News More than half of IT supply chains have been impacted by ransomware attacks in recent years and organisations are failing to implement the necessary steps to prevent future damage
By Connor Jones