Tag

identity fraud protection

identity fraud protection page 1

identity fraud and identity theft protection

When Aaadhaar leaks are real despite denial: This time an LPG Company did it

This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft and identity fraud. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot...
Continue Reading
MyFitnessPal

Under Armour’s MyFitnessPal Hacked – User Data Exposed

Another data has surfaced with respect to the Under Armor’s MyFitnessPal application information break. The information rupture that happened in February 2018, has influenced around 3,977,385 Australian clients.   MyFitnessPal lets users monitor their calorie intake and measure it against the amount of exercise they are doing, with a database of more than 2 million...
Continue Reading
HSBC USA Hacked

HSBC USA Hacked – User Data Compromised

HSBC Bank USA, an American backup of UK based HSBC, has endured an information rupture that brought about the trade off of individual information of a few clients. Despite the fact that the number isn’t yet known, the bank has affirmed that the assault happened between October 4 and October 14, 2018.   What was...
Continue Reading
Data of Moscow’s Elite Leaked in Telecom Incident

Data of Moscow’s Elite Leaked in Telecom Incident

Thousands of wealthy Moscow residents who subscribed to a regional internet provider have had personal data including names, home addresses and mobile numbers posted online. People affected by the high-profile data leak are all clients of Moscow-based internet provider Akado Telecom, a large telecommunications network owned by billionaire businessman Viktor Vekselberg, which said it had...
Continue Reading
fraud

Cloud HR Firm ComplyRight – Hacked!

The seriously threatening part about data intrusion and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...
Continue Reading
Best malware scanner Banking Trojan

Banking Trojan that sniffs out browser and password history

The banking trojan malware was known to have first appeared in 2016. In fact there was an article written about it within our blog: https://www.izoologic.com/2016/07/26/evolving-banking-malware-and-transaction-authentication/ As you can see the malware has evolved once more, but it isn’t new because the malware is customizable to give its evolution. The latest update on the Malware is...
Continue Reading

Hurricane Florence cyber security scams

It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security...
Continue Reading
Crypto Exchange

Crypto Exchange Security – How Secure Are You?

How much do you trust the online sites you give your personal information to? Do you have the same level of trust and confidence when you provide the same information when you open a bank account or process crypto exchange? Where and how do you place your trust? Trust can be varying depending on each...
Continue Reading
Dark Web Monitoring - identity fraud protection

Your life is cheap – DarkWeb Monitoring

For criminals, life is cheap whether it be theirs or their victims. Criminals in the cyberspace and in darkweb are no different too. Lately, it has been a trend left and right that database leaks are frequently happening where people’s email address and password are exposed. However, that is just the tip of the iceberg,...
Continue Reading
Spear phishing scams

Spear Phishing

Spear phishing scams have been around for decades and despite all our best efforts in terms of user education, we continue to see a rise this kind of phishing in terms of volumes and sophistication – it is only the high-profile phishing make headlines. Spear phishing has evolved and continues to evolve. Cybercriminals are using...
Continue Reading