Blog

Phishing Solution

Domain Shadowing

Domain shadowing provides the cybercriminal a series of methodologies to manipulate a genuine domain registrant account allowing the creation of fake subdomains and disrupting DNS configurations for malicious purposes. Our resources show that domain shadowing has now become a greater challenge amongst our client’s and their peers over the previous 12 months. This is a disturbing...
Continue Reading
Spear phishing scams

Spear Phishing

Spear phishing scams have been around for decades and despite all our best efforts in terms of user education, we continue to see a rise this kind of phishing in terms of volumes and sophistication – it is only the high-profile phishing make headlines. Spear phishing has evolved and continues to evolve. Cybercriminals are using social...
Continue Reading
Social Media Monitoring

Social Media Threats

Social Media presents a new set of challenges for the business and is a growing area of online brand abuse and fraud. Social Media provides a new mechanism for cybercrime affording the opportunity to distribute phishing and malware content. Social engineering is a key component of Advanced Persistent Threats — APT attacks and often infrastructure breaches...
Continue Reading
Mobile App Threats

Mobile App Threats

Mobile applications afford a seamless user experience, however, Unofficial, Unauthorised, Rogue, Malicious Mobile Apps provide an emerging threat for cybercrime and brand abuse. Phishing and malware attacks have evolved to target the mobile device and Mobile Apps are a main vector in the delivery of phishing based apps and the delivery of malicious payloads. Mobile Apps...
Continue Reading
Online Brand Abuse - Brand Monitoring

Brand Monitoring

Electronic channels are a highly efficient mechanism of delivering online services, capabilities and transacting with the end user customer presenting many favorable outcomes for the organisation as well as the end user. However, the electronic channel is open to range of abuse and fraud, ranging from benign to malicious activity. The following is an outline of...
Continue Reading
1 17 18 19