Category

Phishing Intelligence
Data breaches
The UK has something of a reputation for its wet climate, and its citizens for constantly talking about the weather. So, it might come as a surprise to find that in the UK the chance of encountering a data breach is higher than that of experiencing a rainy day. A survey by technology services company...
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel
Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication...
Continue Reading
Phishing Prevention
Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...
Continue Reading
Cyber security
Adidas US Site: A hole in a shoe was a hole in Cyber Security It was just last 28th of June when the German based brand sporting supplies giant Adidas announced that there were unauthorized party that claims to have possessed limited data associated with certain Adidas consumers. What are included in the data breach?...
Continue Reading
Phishing Malware
A group of phishing criminals called Silver Terrier originating from Nigeria was known to change its tactics to improve its success rate on getting more victims. The group is not known to conduct sophisticated phishing attacks, and they still heavily rely on email phishing campaigns. However the group seemed to be dedicated to do more...
Continue Reading
Phishing attacks are the most common to affect an individual or organisation. Phishing email campaigns are easy to execute and can use a combination of different techniques in order to get someone to provide their credentials via a fake login page. These attacks won’t stop, because in this age of information it is very easy...
Continue Reading
Phishing Powered by Advertisement
      Basically, the criminals were able to get their ads approved by Adwords far too easily. They have been advertising their websites to appear on the topmost results whenever the desired keyword hits. The popular victims of these phishing attacks are cryptocurrency users and cryptocurrency exchanges, but not limited to those group of...
Continue Reading
phishing prevention
The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking...
Continue Reading
Personalized Phishing
Sophisticated Spear Phishing: Customized Phishing Attacks Our  Phishing Intelligence team noticed that sophisticated phishing attacks are more likely to occur these days targeting corporate employees and their contacts in their email addresses. This is commonly known as Spear Phishing is needed. Basically this type of phishing attack is devised by doing a thorough research on specific targets,...
Continue Reading
How effective is browser blocking against phishing sites
Browser blocking of phishing sites – does the browser provide a phishing solution?  iZOOlogic threat detection and analysis engines are sifting through vast amounts of phishing intelligence and malicious data – sourcing literally thousands of new phishing sites each day. All day and every day. iZOOlogic provides a swift response to those phishing sites that...
Continue Reading