Category

Phishing protection
Hijacking UK Email Accounts for Phishing
There has been a significant rise in stolen corporate email accounts that are being used in phishing attempts. This is according to a new report by security experts Barracuda. The security firm is claiming email accounts from employees all over the UK are being stolen. Hackers would then log into these accounts remotely and, posing...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks
Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
GhostDNS Malware Hacked 100K Routers For Phishing - iZOOlogic
A cyberattack likened to a DNS-changer infiltration was first spotted in August on several D-Link routers in Brazil has expanded to affect more than 80 different network devices and more than 100,000 individual kits. Radware first identified the latest campaign, which started as an attack on Banco de Brasil customers via a DNS redirection that...
Continue Reading
Fake Netflix Scams Love Free Subscriptions
Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data...
Continue Reading
Emails Being Recorded
Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting...
Continue Reading
Phishing Powered by Advertisement
      Basically, the criminals were able to get their ads approved by Adwords far too easily. They have been advertising their websites to appear on the topmost results whenever the desired keyword hits. The popular victims of these phishing attacks are cryptocurrency users and cryptocurrency exchanges, but not limited to those group of...
Continue Reading
Anti Phishing
With the latest boom where a growing number of users trading Cryptocurrencies has caught the attention of cyber-criminals who dares to take advantage of this craze in order to gain their own fortune. It is quite alarming to acknowledge that scammers were on the loose to bring misfortune for their own fortune through methods such...
Continue Reading
Phishing Solution
Protecting a website As a website owner to promote and conduct transactions for your own business using the internet is beneficial to the business. A website is considered to be a company or an individual’s representative in the online world. As the perceived representation of an entity or individual it is logical to apply protection...
Continue Reading
Android Triple Threat
Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined...
Continue Reading
Spoofed Phishing - Mailsploit iZOOlogic
The Perfect Email Disguise Whenever criminals want to trick someone online they usually fake identities, and spoofing an email address is the oldest trick in the book. A never ending technique to get information which is called phishing has been coupled with spoofed email sending out almost perfectly crafted messages to trick someone into clicking...
Continue Reading
1 2 3

Categories