Category

Phishing Prevention
Phishing Solution
Protecting a website As a website owner to promote and conduct transactions for your own business using the internet is beneficial to the business. A website is considered to be a company or an individual’s representative in the online world. As the perceived representation of an entity or individual it is logical to apply protection...
Continue Reading
Cryptojacking Introduction
Mining for a stranger? How about a no? Trick and Cyber threats on the cyber world never seems to end, because it just keeps on evolving. Another thing to watch out for on the list of unseen threats through the eyes of our unsuspecting users is what we call “Cryptojacking”. Due to the rise and...
Continue Reading
Spoofed Phishing - Mailsploit iZOOlogic
The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking...
Continue Reading
iZOOlogic, Phishing Prevention, Freeloading malware not free, Anti-Phishing Solution
Cracked Software for Free? It has been a long time since piracy became rampant exploiting software such as operating systems, productivity tools, and entertainment programs like games that were pirated by “Pirates” through code cracking, and then redistributing them for free with some special instructions in order to access the premium software for “free”. For...
Continue Reading
Goodbye Alphabay & Hansa Market
The Fall of Alpha and Hansa In case you haven’t heard about Alphabay and Hansa market; these are two well-known marketplaces that used to exist on the Darknet. They are popular for the reason that most vendors are legitimate in a sense that scams are less likely to happen, due to their secured trade system...
Continue Reading
browserPlugin | iZOOlogic
Phishing protection, protecting the business and end user victims, requires a layered approach. Although we have discussed the limitation of end user protection at the browser level, we still recommend User use this point of protection. Browser plugins provide phishing protection against phishing sites. In this article, we review some common desktop applications that can...
Continue Reading
2017 | iZOOlogic
It may be a new year but we can be sure that phishing will again be upon us. So far in the first two days of 2017 we have seen the usual suspects being targeted, Apple, PayPal, Amazon, Scotia Bank, ANZ, HSBC, Facebook, the list of targeted phishing is endless…. Phishing first came to light...
Continue Reading
Ransomware: the new kind of malware
Ransomware is one of the greatest emerging cybercrime challenges. Ransomware is the largest malware taxonomy and most phishing emails in 2016 contain ransomware. The tactic of ransomware is to hold the victim to extortion by encrypting the victim’s documents, files or disks until the person pays a ransom fee via bitcoin or voucher. The main...
Continue Reading
APWG – Phishing Trends Activity Report
Anti-Phishing Working Group – Phishing Trends Activity Report – Q2 2016 Summary of Findings: The Retail/Service sector remained the most- targeted industry sector during the second quarter of 2016, suffering 43% of attacks The number of brands targeted by phishers in the second quarter remained consistent – ranging from 411 to 425 different brands each...
Continue Reading
Real Time Phishing is Man in the Middle (MitM) attack
Real Time Phishing is a Man-in-the-Middle (MitM) attack that allows the criminal to commit real time fraud. Stolen credentials from the phishing site are used to access the internet bank session in real time. Real time phishing allows the criminal to readily bypass banking authentication protocols. Real time phishing schemes take place over a web...
Continue Reading
1 2 3

Categories