Category

Cyber Security
Bitcoins Cyber Criminals, Cybercrime Solutions
What happened? Recently a known Bitcoin exchange which is BTC-E has been shut down and seized by 6 US law enforcement agencies, due to the exchange’s involvement in the theft of 2.21 billion USD from two well-known Bitcoin exchanges Bitcoinica and Mt. Gox. The founder of BTC-E who is named Alexander Vinnick was arrested in...
Continue Reading
Cyber Data Theft, Online Fraud Prevention, Brand Protection
Lately the popular cable and satellite TV network HBO has fallen victim to hacking, as a result a total of 1.5 TB of data were stolen which is quite alarming because this is the biggest data theft incident yet that happened ever since Sony leaks happened last 2014. The hackers claimed that the immense data...
Continue Reading
vishing-arm izoologic
Vishing, a term that relates to “Voice – Phishing” is a type of social engineering attack that has a high degree of variety.  Vishing takes the form of a criminal using a telephone to make a social engineering attempt against the victim to conduct fraud. Vishing maybe as simple as criminal A – speaking to...
Continue Reading
Ransomware: the new kind of malware
Ransomware is one of the greatest emerging cybercrime challenges. Ransomware is the largest malware taxonomy and most phishing emails in 2016 contain ransomware. The tactic of ransomware is to hold the victim to extortion by encrypting the victim’s documents, files or disks until the person pays a ransom fee via bitcoin or voucher. The main...
Continue Reading
Real Time Phishing
Real Time Phishing is a Man-in-the-Middle (MitM) attack that allows the criminal to commit real time fraud. Stolen credentials from the phishing site are used to access the internet bank session in real time. Real time phishing allows the criminal to readily bypass banking authentication protocols. Real time phishing schemes take place over a web...
Continue Reading
WHALING – Big Game Spear Phishing
Whaling is a type of spear phishing that targets high-profile end users such as C-level corporate executives. Similar to traditional based phishing, whaling leverages social engineering against the victim and uses some technological play in the background. Whaling content – messaging and website are very personalised – this is personal – one on one –...
Continue Reading
1 10 11 12

Categories