Blog

fraud prevention and detection

Massive Breach On Online Credentials

After Equifax What’s Next The rampant carnage of cybercriminals on your private information does not end with Equifax which is unfortunate for law-abiding businesses and casual users of the internet. Why? Because such crimes are still ongoing, and this will not be easily stopped. What happened? Fresh from the shelves of Switzerland the Reporting and Analysis...
Continue Reading
Equifax Data Breach Surprise | iZOOlogic

The Equifax Data Breach Surprise

Equifax Data Breach Lately, a major consumer credit reporting company was attacked by hackers which resulted in a massive data breach. The data breach affected those who had a credit history in the US, UK, and Canada. An estimated 143 million people were affected by the breach. Equifax recently announced the incident but the company thinks...
Continue Reading
Android Based Botnet launches DDoS Attacks, Phishing Intelligence

Android Based Botnet launches DDoS Attacks

On the 17th of August, a lot of content providers and delivery network companies were attacked by a botnet called WireX. A multitude of Android devices was being used to launch the attack to the targeted victims through malicious applications on the devices that are running in the background and is programmed to create DDoS traffic....
Continue Reading
Social Media Monitoring

Social Media Account Take Over

Social Media use nowadays is commonplace, along with its popular use comes a great risk of identity theft and other abuse and fraud. Maintaining secure social networks is challenging  due to the diversity of communities and the ability to create accounts and identities with minimal verification and authenitication. Currently social media platforms are still booming, and...
Continue Reading
Bitcoins Cyber Criminals, Cybercrime Solutions

Bitcoins for Cyber Criminals? Goodbye BTC-E

What happened? Recently a known Bitcoin exchange which is BTC-E has been shut down and seized by 6 US law enforcement agencies, due to the exchange’s involvement in the theft of 2.21 billion USD from two well-known Bitcoin exchanges Bitcoinica and Mt. Gox. The founder of BTC-E who is named Alexander Vinnick was arrested in Greece...
Continue Reading
Cyber Data Theft

Cyber Data Theft: How it could affect your business

Lately the popular cable and satellite TV network HBO has fallen victim to hacking, as a result a total of 1.5 TB of data were stolen which is quite alarming because this is the biggest data theft incident yet that happened ever since Sony leaks happened last 2014. The hackers claimed that the immense data that...
Continue Reading
Goodbye Alphabay & Hansa Market

Goodbye Alphabay and Hansa Market

The Fall of Alpha and Hansa In case you haven’t heard about Alphabay and Hansa market; these are two well-known marketplaces that used to exist on the Darknet. They are popular for the reason that most vendors are legitimate in a sense that scams are less likely to happen, due to their secured trade system that...
Continue Reading
Introduction Deep Dark Web, Dark Web Solutions

Introduction to the Deep and Dark Web

The Dark Web First let’s define the internet “The internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide”. Now we know what the internet is, and we have been enjoying the benefits and convenience in our today’s life. However most users are only aware what the surface internet/clear net...
Continue Reading
Voice-Phishing-Vishing-Attack-Targeting-Numerous-of-Banks

A new kind of Voice Phishing – “please say yes”

A new kind of Voice Phishing is circulating – the ‘can you hear me?’ phone scam has been reported in US, UK, and Australia.   This is a little different to the traditional Vishing or Voice Phishing methods that directly attempt to steal account credentials and personal information.   The scammer records the victim’s voice and...
Continue Reading
Phishing Protection

Analysis of browser plugins to provide phishing protection

Phishing protection, protecting the business and end user victims, requires a layered approach. Although we have discussed the limitation of end user protection at the browser level, we still recommend User use this point of protection. Browser plugins provide phishing protection against phishing sites. In this article, we review some common desktop applications that can block...
Continue Reading
brand protection

The era of Fake News – beware all Executives.

Fake News impacts business Executives and organisation brand. We have entered a new era of “Fake News” which can have a direct impact on all business Executives and brand protection strategies.  Fake News is real news – if you believe it. Fake News is being spread on dubious websites, specifically set up for this purpose. Fake...
Continue Reading
phishing and malware attacks

Two new malware (financial Trojans) – Corebot and Shifu

Cybercriminals have a large range of tools and resources to launch phishing and malware attacks against online platforms. The dark web provides fertile grounds for criminals to opening discuss methodologies and trade new malware variants, types and processes. From well-established banking malware, such as Dyre, ZeuS and Kronos, to more recently discovered malware, such as Shifu...
Continue Reading
traditional phishing

A new year, an old threat – traditional phishing

It may be a new year but we can be sure that phishing will again be upon us. So far in the first two days of 2017 we have seen the usual suspects being targeted, Apple, PayPal, Amazon, Scotia Bank, ANZ, HSBC, Facebook, the list of targeted phishing is endless…. Phishing first came to light more...
Continue Reading
Shutterstock izoologic

Email remains the default vector for distributing phishing and malware content.

Cybercriminals still use emails to launch the social engineering component of a phishing or malware attack. Email content uses a “call to action’ such as a security update, web payment or refund to lure victims into clicking on the embedded link. Users are routed to fake web content or to download malicious attachment and executables. Criminals...
Continue Reading
SMiShing

An alternative flavour of SMiShing

SMiShing attacks often leverage a trusted brand to route the victim to a phishing site. An alternative variant of SMiShing is where the spam message contains only a call back number. The message maybe as simple as “Please urgently call back xxxx xxxx xxxx to update your account details” and there is no mention of a...
Continue Reading
vishing-arm izoologic

Vishing – a persistent type of Voice Phishing

Vishing, a term that relates to “Voice – Phishing” is a type of social engineering attack that has a high degree of variety.  Vishing takes the form of a criminal using a telephone to make a social engineering attempt against the victim to conduct fraud. Vishing maybe as simple as criminal A – speaking to victim...
Continue Reading
Domain name spaming

Phishing spam sent from specifically registered domain names bypasses email authentication

Phishing spam is often sent from specifically registered domain names and domain zones to increase the efficacy of the phishing attack. This means that current email authentication systems are readily bypassed. Phishing spam forms the first component of the social engineering attempt. The phishing message must appear like it has come from a legitimate and trusted...
Continue Reading
financial Trojan

Bolek malware– the latest generation of financial Trojan

Bolek malware is a new generation of financial trojan with an increased level of sophisitcation and stealth. Bolek was documented by the Polska CERT team in 2016 and named after a local cartoon character – “Bolek”, but this is no children’s show. Bolek’s primary function is targeting banks to steal login credentials from online banking applications....
Continue Reading
Malware - Financial Trojans

Top 4 Malware – Financial Trojans – Zeus, Carberp, Citadel and SpyEye.

Let us introduce the Top 4 Malware – Financial Trojans – Zeus, Carberp, Citadel and SpyEye. Later in this series of articles we will look into each malware (financial Trojan) in greater detail but allow us to make the formal introductions. Carberp Carberp was originally introduced as a typical financial Trojan. It was designed to steal...
Continue Reading
APWG – Phishing Trends Activity Report

APWG – Phishing Trends Activity Report – Q2 2016 : Summary of Findings

Anti-Phishing Working Group – Phishing Trends Activity Report – Q2 2016 Summary of Findings: The Retail/Service sector remained the most- targeted industry sector during the second quarter of 2016, suffering 43% of attacks The number of brands targeted by phishers in the second quarter remained consistent – ranging from 411 to 425 different brands each month...
Continue Reading
1 20 21 22 23