Blog

Anti Phishing Service

Darkweb Alphabay Resurgence

Empire Market a Shadow of the Glorious Alphabay It is back and now with a different name. The former site which was well-known in the Dark Web used to be called Alphabay was seized and then shut down by the authorities. A lot of dark netizens were hopeful that the site would re-emerge with a clone...
Continue Reading
Anti Phishing

Malware as Browser Plugins

Watch out for browser extensions this time Previously we have been talking about mobile apps mostly on the Android environment that are being used to hijack malware into some legitimate looking apps in order to deploy different scripts to steal as much data to extort money either by combining phishing attack strategies or directly snoop data...
Continue Reading
Anti-Phishing Services

Phished Credentials Flourished on the Dark Web

What lies further beneath the Dark Web? It is undeniable that the surface web itself already has tons of problems especially when it comes to security. A web that is monitored and reachable by the government and authorities where cybercrime usually happens. It is because security does not rely solely on the technology itself, it is...
Continue Reading
SpriteCoin

Hottest New Currency They Say SpriteCoin

What is the new scam of the town? Cryptocurrency boom has been in effect and it has been the talk of town, a lot of businesses and individuals took advantage of the craze where some created their own cryptocurrencies to join in the hype. Of course cybercriminals also joined in the fray by using cryptocurrencies so...
Continue Reading
malware-spyware

Ever Powerful Skygofree Android Malware

A wonderful serenity has taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole heart. I am alone, and feel the charm of existence in this spot, which was created for the bliss of souls like mine. I am so happy, my dear friend, so absorbed in the...
Continue Reading
Cryptojacking Introduction

Cryptojacking an Introduction

Mining for a stranger? How about a no? Trick and Cyber threats on the cyber world never seems to end, because it just keeps on evolving. Another thing to watch out for on the list of unseen threats through the eyes of our unsuspecting users is what we call “Cryptojacking”. Due to the rise and popularity...
Continue Reading
Android Triple Threat

Triple Threat Approach Android

Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined to...
Continue Reading
phishing malware

Android Phishing App Catelites

Recently there has been a new Android malware which runs rampant that targets your bank credentials straight right off your fingertips. This is not a new case where phishing apps pretend to be a legitimate banking app just to steal your credentials. However, this time it keeps evolving and gets more deceitful. Adaptive Nature The new...
Continue Reading
Net Neutrality Contributes Secured Internet

Net Neutrality in Securing The Internet

What is Net Neutrality? From the word itself which is neutrality; unbiased and an open freedom for all. This way people governed under the famous Net Neutrality act gets to enjoy the liberty of surfing the internet, view contents and post anything not libelous nor derogatory would have nothing to fear. It prohibits internet service providers...
Continue Reading
phishing prevention

Spoofed Phishing – Mailsploit

The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking a...
Continue Reading
Bitcoin Security Concerns

Bitcoin Security Concerns

Why is it such a boom? Bitcoin has been popular for quite some now. It used to be a quiet digital currency for a few people at first, because of its growth and potential it has been slowly been building up popularity, and with popularity comes the interest of the masses growing steady and slow. But...
Continue Reading
Phishing solutions

Phish Bait – Art of baiting

Clickbait Scam Getting tricked is the classic way of how criminals try to take advantage of people they want to steal from, and click baiting is one of the cyber classics to do it. With accompanied technical knowledge the success rate of hackers and criminals has shoot up and they became more productive and active on...
Continue Reading
Fraud Prevention tips

Click Jacking

Clicking Gone Wrong: Click Jacking and Click Baiting A lot of computer user love using the internet which leads to manage, and when users use the internet of course it is inevitable to open up a browser. Doing a lot of stuff on the web such as online shopping, social interaction and reading our emails. But...
Continue Reading
Personalized Phishing

Personalized Phishing

Sophisticated Spear Phishing: Customized Phishing Attacks Our  Phishing Intelligence team noticed that sophisticated phishing attacks are more likely to occur these days targeting corporate employees and their contacts in their email addresses. This is commonly known as Spear Phishing is needed. Basically this type of phishing attack is devised by doing a thorough research on specific targets, and...
Continue Reading
Phish Beneath IOS Environment, anti-phishing solution

Phish Under The IOS Environment

Surprised? A Phishing modus designed to take your Apple ID password from you. A lot of people still claims that the iOS is Malware proof and/or is attack proof that is what majority of the people know since most users just want the simplicity of using their phones from their pockets. Advertisements and the media are more...
Continue Reading

Cybersecurity Mitigation and Phishing

Cybersecurity and Attack Mitigation (Phishing) We can all agree that prevention is better than cure in any situation whether it be critical or not. After all who wants to deal with a problem just because there were no precautions done? Especially in today’s cyberspace, digital crimes do happen left and right. Sometimes the victims do not...
Continue Reading
ransomware Malware removal

Not Petya Strikes Back as Bad Rabbit Ransomware

Fake News? What’s worse is a Ransomware to Ruin Your Day. People whose job is to gather information, do general research on current events may have been previous victims of fake news from Fake News Sites. Believing in false information could harm you intellectually and socially. What’s worse that could happen next, assuming people has already...
Continue Reading
Corporate Cybercrime

Rouge Employees on Corporate Cybercrime

Employee gone rogue is definitely a threat to the integrity of your data, especially those who have a high rank due to their access and privilege, but fingers do not exclusively point to high ranking employees. What could be the possible risks? Data Theft Robbery(inside job) Online forgery Phishing activities A lot of incidents could root...
Continue Reading
Cybersquatting Domain Profiteering,Domain Name Monitoring

Cybersquatting Domain Profiteering

The Cyber world of Today The World Wide Web is a huge space where a lot of people gather, interact, educate, and etc. With a lot of activities which feed people’s minds and the ability to conduct a lot of transactions in the internet space, it is a pretty convenient space for the majority of the...
Continue Reading
iZOOlogic, Phishing Prevention, Freeloading malware not free, Anti-Phishing Solution

Freeloading With Malware Is Not Free

Cracked Software for Free? It has been a long time since piracy became rampant exploiting software such as operating systems, productivity tools, and entertainment programs like games that were pirated by “Pirates” through code cracking, and then redistributing them for free with some special instructions in order to access the premium software for “free”. For free,...
Continue Reading
1 12 13 14 15 16 17