Phishing is a leading source of brand abuse and online fraud. Phishing continues to be the mainstay of the cybercrime ecosystem with techniques becoming more sophisticated, volumes increasing and more brands targeted. Phishing may employ a variety of methods to attack multiple eChannels in a blended threat against the organisation. Phishing is a major challenge for any business transacting via electronic channels.
iZOOlogic employs a variety of proprietary techniques and methodologies to provide robust Phishing Protection and Anti Phishing Solutions. iZOOlogic will provide real time monitoring of eChannels, deploy a range electronic counter measures, provide pre-attack intelligence and pro-active detection. iZOOlabs will provide a platform to details incident and forensic analysis to mitigate current attacks. iZOOlogic provides a swift response to those phishing sites that are targeting our clients.
iZOOlogic solutions will readily detect and respond to phishing attacks, and successfully resolve attacks to provide real time mitigation prior to fraud events. iZOOlogic has a unique matrix of phishing solutions to identify account compromised by phishing before real time phishing occurs. iZOOlogic analysts will be able to recover stolen assets, compromised account to allow client to mitigate accounts. iZOOlogic will allow the business to quickly recover from attack, reduce fraud losses and provide threat intelligence against future attacks.
Smishing or SMSishing is phishing content targeting the mobile User, delivered via SMS (Short Message Service). SMS provides an alternate avenue for cybercriminals to target the mobile end user, delivering phishing content and mobile malware and online scams that may leverage the trusted brand.
Vishing – Voice Phishing – uses voice combined with social engineering to provide the cybercriminal another avenue to commit fraud against the business. Cybercriminals can compromise a VoIP system, and combined with other methods, such a voicemail, SMS, email or IM, then use social engineering, leveraging a trusted brand to trick the victim into identity theft and disclosure of personal or financial information.
Pharming attacks re-route web traffic to a malicious third parties and is becoming a more common phishing method. Pharming has traditionally been an attack on DNS root infrastructure, but has evolved to more localised attacks from local DNS servers, to the client, and may involve blended social engineering techniques.
Social Media presents a new set of challenges for the business and is a growing area of online brand abuse leading to message dilution and corporate identity theft. Social Media provides a new mechanism for cybercrime affording the opportunity to distribute phishing and malware content.
Rogue, Unofficial, Unauthorised, Malicious Mobile Apps provide an emerging threat for cybercrime and brand abuse. Phishing is shifting to target the mobile user through spoofed mobile sites and Apps. Mobile malware is a growing area leading to fraud and abuse.