Category

Phishing
Phishing via Misspelling
Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...
Continue Reading
Fake Netflix Scams Love Free Subscriptions
Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data...
Continue Reading
Emails Being Recorded
Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting...
Continue Reading
Trojan-like Chrome Extension Steals Bank Account Data
Visiting Google, Apple, Amazon or other legitimate online markets for downloading software content are, at best, safe. But although they are official sources we’ve come to fully accept and familiarize about, these are things which aren’t 100% safe. Take for example, a recent Google Chrome Extension called “Desbloquear Conteúdo” (Portuguese for “Unblock contents”), masquerades as...
Continue Reading
A group of phishing criminals called Silver Terrier originating from Nigeria was known to change its tactics to improve its success rate on getting more victims. The group is not known to conduct sophisticated phishing attacks, and they still heavily rely on email phishing campaigns. However the group seemed to be dedicated to do more...
Continue Reading
We have to be aware on how our private information and security is being handled. Crypto currency exchanges are no exception, because malicious attacks such as phishing and its kind exist, and have already found a way to exploit the technology. Aside from technology being exploited, the general public is also a key aspect for...
Continue Reading
Android Triple Threat
Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined...
Continue Reading
2017 | iZOOlogic
It may be a new year but we can be sure that phishing will again be upon us. So far in the first two days of 2017 we have seen the usual suspects being targeted, Apple, PayPal, Amazon, Scotia Bank, ANZ, HSBC, Facebook, the list of targeted phishing is endless…. Phishing first came to light...
Continue Reading
Shutterstock izoologic
Cybercriminals still use emails to launch the social engineering component of a phishing or malware attack. Email content uses a “call to action’ such as a security update, web payment or refund to lure victims into clicking on the embedded link. Users are routed to fake web content or to download malicious attachment and executables....
Continue Reading
Domain name spaming
Phishing spam is often sent from specifically registered domain names and domain zones to increase the efficacy of the phishing attack. This means that current email authentication systems are readily bypassed. Phishing spam forms the first component of the social engineering attempt. The phishing message must appear like it has come from a legitimate and...
Continue Reading
1 2

Categories