Blog

Personalized Phishing

Personalized Phishing

Sophisticated Spear Phishing: Customized Phishing Attacks Our  Phishing Intelligence team noticed that sophisticated phishing attacks are more likely to occur these days targeting corporate employees and their contacts in their email addresses. This is commonly known as Spear Phishing is needed. Basically this type of phishing attack is devised by doing a thorough research on specific targets, and...
Continue Reading
Phish Beneath IOS Environment, anti-phishing solution

Phish Under The IOS Environment

Surprised? A Phishing modus designed to take your Apple ID password from you. A lot of people still claims that the iOS is Malware proof and/or is attack proof that is what majority of the people know since most users just want the simplicity of using their phones from their pockets. Advertisements and the media are more...
Continue Reading

Cybersecurity Mitigation and Phishing

Cybersecurity and Attack Mitigation (Phishing) We can all agree that prevention is better than cure in any situation whether it be critical or not. After all who wants to deal with a problem just because there were no precautions done? Especially in today’s cyberspace, digital crimes do happen left and right. Sometimes the victims do not...
Continue Reading
ransomware Malware removal

Not Petya Strikes Back as Bad Rabbit Ransomware

Fake News? What’s worse is a Ransomware to Ruin Your Day. People whose job is to gather information, do general research on current events may have been previous victims of fake news from Fake News Sites. Believing in false information could harm you intellectually and socially. What’s worse that could happen next, assuming people has already...
Continue Reading
Corporate Cybercrime

Rouge Employees on Corporate Cybercrime

Employee gone rogue is definitely a threat to the integrity of your data, especially those who have a high rank due to their access and privilege, but fingers do not exclusively point to high ranking employees. What could be the possible risks? Data Theft Robbery(inside job) Online forgery Phishing activities A lot of incidents could root...
Continue Reading
Cybersquatting Domain Profiteering,Domain Name Monitoring

Cybersquatting Domain Profiteering

The Cyber world of Today The World Wide Web is a huge space where a lot of people gather, interact, educate, and etc. With a lot of activities which feed people’s minds and the ability to conduct a lot of transactions in the internet space, it is a pretty convenient space for the majority of the...
Continue Reading
iZOOlogic, Phishing Prevention, Freeloading malware not free, Anti-Phishing Solution

Freeloading With Malware Is Not Free

Cracked Software for Free? It has been a long time since piracy became rampant exploiting software such as operating systems, productivity tools, and entertainment programs like games that were pirated by “Pirates” through code cracking, and then redistributing them for free with some special instructions in order to access the premium software for “free”. For free,...
Continue Reading
Growing Impact of Cybercrime | Cybercriminals | Cybercrime Solutions

Growing Impact of Cybercrime

How deeply rooted is cybercrime? Cybercrime has been rampant since the computer age started, from petty crimes such as performing weird functions on your computer to defacing, and now critical theft where even a country could even make an economy out of it. The first massive cybercrime attacks were back in 1989 when $70 million was...
Continue Reading
fraud prevention and detection

Massive Breach On Online Credentials

After Equifax What’s Next The rampant carnage of cybercriminals on your private information does not end with Equifax which is unfortunate for law-abiding businesses and casual users of the internet. Why? Because such crimes are still ongoing, and this will not be easily stopped. What happened? Fresh from the shelves of Switzerland the Reporting and Analysis...
Continue Reading
Equifax Data Breach Surprise | iZOOlogic

The Equifax Data Breach Surprise

Equifax Data Breach Lately, a major consumer credit reporting company was attacked by hackers which resulted in a massive data breach. The data breach affected those who had a credit history in the US, UK, and Canada. An estimated 143 million people were affected by the breach. Equifax recently announced the incident but the company thinks...
Continue Reading
Android Based Botnet launches DDoS Attacks, Phishing Intelligence

Android Based Botnet launches DDoS Attacks

On the 17th of August, a lot of content providers and delivery network companies were attacked by a botnet called WireX. A multitude of Android devices was being used to launch the attack to the targeted victims through malicious applications on the devices that are running in the background and is programmed to create DDoS traffic....
Continue Reading
Social Media Monitoring

Social Media Account Take Over

Social Media use nowadays is commonplace, along with its popular use comes a great risk of identity theft and other abuse and fraud. Maintaining secure social networks is challenging  due to the diversity of communities and the ability to create accounts and identities with minimal verification and authenitication. Currently social media platforms are still booming, and...
Continue Reading
Bitcoins Cyber Criminals, Cybercrime Solutions

Bitcoins for Cyber Criminals? Goodbye BTC-E

What happened? Recently a known Bitcoin exchange which is BTC-E has been shut down and seized by 6 US law enforcement agencies, due to the exchange’s involvement in the theft of 2.21 billion USD from two well-known Bitcoin exchanges Bitcoinica and Mt. Gox. The founder of BTC-E who is named Alexander Vinnick was arrested in Greece...
Continue Reading
Cyber Data Theft

Cyber Data Theft: How it could affect your business

Lately the popular cable and satellite TV network HBO has fallen victim to hacking, as a result a total of 1.5 TB of data were stolen which is quite alarming because this is the biggest data theft incident yet that happened ever since Sony leaks happened last 2014. The hackers claimed that the immense data that...
Continue Reading
Goodbye Alphabay & Hansa Market

Goodbye Alphabay and Hansa Market

The Fall of Alpha and Hansa In case you haven’t heard about Alphabay and Hansa market; these are two well-known marketplaces that used to exist on the Darknet. They are popular for the reason that most vendors are legitimate in a sense that scams are less likely to happen, due to their secured trade system that...
Continue Reading
Introduction Deep Dark Web, Dark Web Solutions

Introduction to the Deep and Dark Web

The Dark Web First let’s define the internet “The internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide”. Now we know what the internet is, and we have been enjoying the benefits and convenience in our today’s life. However most users are only aware what the surface internet/clear net...
Continue Reading
Voice-Phishing-Vishing-Attack-Targeting-Numerous-of-Banks

A new kind of Voice Phishing – “please say yes”

A new kind of Voice Phishing is circulating – the ‘can you hear me?’ phone scam has been reported in US, UK, and Australia. This is a little different to the traditional Vishing or Voice Phishing methods that directly attempt to steal account credentials and personal information. The scammer records the victim’s voice and it begins...
Continue Reading
Phishing Protection

Analysis of browser plugins to provide phishing protection

Phishing protection, protecting the business and end user victims, requires a layered approach. Although we have discussed the limitation of end user protection at the browser level, we still recommend User use this point of protection. Browser plugins provide phishing protection against phishing sites. In this article, we review some common desktop applications that can block...
Continue Reading
brand protection

The era of Fake News – beware all Executives.

Fake News impacts business Executives and organisation brand. We have entered a new era of “Fake News” which can have a direct impact on all business Executives and brand protection strategies.  Fake News is real news – if you believe it. Fake News is being spread on dubious websites, specifically set up for this purpose. Fake...
Continue Reading
phishing and malware attacks

Two new malware (financial Trojans) – Corebot and Shifu

Cybercriminals have a large range of tools and resources to launch phishing and malware attacks against online platforms. The dark web provides fertile grounds for criminals to opening discuss methodologies and trade new malware variants, types and processes. From well-established banking malware, such as Dyre, ZeuS and Kronos, to more recently discovered malware, such as Shifu...
Continue Reading
1 15 16 17 18 19