Category

Anti-Phishing
tech support scam
Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to...
Continue Reading
URL Spoofing on Safari Browsers
An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still...
Continue Reading
More victims for Magecart Hack Group
Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify...
Continue Reading
E-MAIL: The Single Heaviest Security Challenge for Companies Today
E-Mail, or electronic mail is the single most effective and efficient commonplace method of communicating with someone in the business world today. Even as other methods of digital communication have come and gone, over its 40-year history, email still remains the backbone of business communications with almost 4 Billion users worldwide collectively sending 300 billion...
Continue Reading
Hurricane Florence Cyber Security Scams
It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security...
Continue Reading
Social Media Abuse
Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works...
Continue Reading
UnityPoint Hacked
A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information,...
Continue Reading
Phishing via Misspelling
Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...
Continue Reading
A hole in a shoe was a hole in cyber security
Adidas US Site: A hole in a shoe was a hole in Cyber Security It was just last 28th of June when the German based brand sporting supplies giant Adidas announced that there were unauthorized party that claims to have possessed limited data associated with certain Adidas consumers. What are included in the data breach?...
Continue Reading
Emails Being Recorded
Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting...
Continue Reading
1 2 3 6

Categories