Category

Phishing Prevention
A group of phishing criminals called Silver Terrier originating from Nigeria was known to change its tactics to improve its success rate on getting more victims. The group is not known to conduct sophisticated phishing attacks, and they still heavily rely on email phishing campaigns. However the group seemed to be dedicated to do more...
Continue Reading
Phishing attacks are the most common to affect an individual or organisation. Phishing email campaigns are easy to execute and can use a combination of different techniques in order to get someone to provide their credentials via a fake login page. These attacks won’t stop, because in this age of information it is very easy...
Continue Reading
Phishing Powered by Advertisement
      Basically, the criminals were able to get their ads approved by Adwords far too easily. They have been advertising their websites to appear on the topmost results whenever the desired keyword hits. The popular victims of these phishing attacks are cryptocurrency users and cryptocurrency exchanges, but not limited to those group of...
Continue Reading
Phishing Solution
Protecting a website As a website owner to promote and conduct transactions for your own business using the internet is beneficial to the business. A website is considered to be a company or an individual’s representative in the online world. As the perceived representation of an entity or individual it is logical to apply protection...
Continue Reading
Spoofed Phishing - Mailsploit iZOOlogic
The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking...
Continue Reading
iZOOlogic, Phishing Prevention, Freeloading malware not free, Anti-Phishing Solution
Cracked Software for Free? It has been a long time since piracy became rampant exploiting software such as operating systems, productivity tools, and entertainment programs like games that were pirated by “Pirates” through code cracking, and then redistributing them for free with some special instructions in order to access the premium software for “free”. For...
Continue Reading
Goodbye Alphabay & Hansa Market
The Fall of Alpha and Hansa In case you haven’t heard about Alphabay and Hansa market; these are two well-known marketplaces that used to exist on the Darknet. They are popular for the reason that most vendors are legitimate in a sense that scams are less likely to happen, due to their secured trade system...
Continue Reading
browserPlugin | iZOOlogic
Phishing protection, protecting the business and end user victims, requires a layered approach. Although we have discussed the limitation of end user protection at the browser level, we still recommend User use this point of protection. Browser plugins provide phishing protection against phishing sites. In this article, we review some common desktop applications that can...
Continue Reading
Ransomware: the new kind of malware
Ransomware is one of the greatest emerging cybercrime challenges. Ransomware is the largest malware taxonomy and most phishing emails in 2016 contain ransomware. The tactic of ransomware is to hold the victim to extortion by encrypting the victim’s documents, files or disks until the person pays a ransom fee via bitcoin or voucher. The main...
Continue Reading

Categories