Tag

Online Fraud Prevention
Trojan-like Chrome Extension Steals Bank Account Data
Visiting Google, Apple, Amazon or other legitimate online markets for downloading software content are, at best, safe. But although they are official sources we’ve come to fully accept and familiarize about, these are things which aren’t 100% safe. Take for example, a recent Google Chrome Extension called “Desbloquear Conteúdo” (Portuguese for “Unblock contents”), masquerades as...
Continue Reading
How much do you trust the online sites you give your personal information to? Do you have the same level of trust and confidence when you provide the same information when you open a bank account? Where and how do you place your trust? Trust can be varying depending on each individual’s experience. Some doubt...
Continue Reading
Phish Beneath IOS Environment, anti-phishing solution
Surprised? A Phishing modus designed to take your Apple ID password from you. A lot of people still claims that the iOS is Malware proof and/or is attack proof that is what majority of the people know since most users just want the simplicity of using their phones from their pockets. Advertisements and the media are...
Continue Reading
Cybersecurity and Attack Mitigation (Phishing) We can all agree that prevention is better than cure in any situation whether it be critical or not. After all who wants to deal with a problem just because there were no precautions done? Especially in today’s cyberspace, digital crimes do happen left and right. Sometimes the victims do...
Continue Reading
Rouge Employees Corporate Cybercrime, Anti-Malware Solution, Phishing Solutions
Employee gone rogue is definitely a threat to the integrity of your data, especially those who have a high rank due to their access and privilege, but fingers do not exclusively point to high ranking employees. What could be the possible risks? Data Theft Robbery(inside job) Online forgery Phishing activities A lot of incidents could...
Continue Reading
Growing Impact of Cybercrime | Cybercriminals | Cybercrime Solutions
How deeply rooted is cybercrime? Cybercrime has been rampant since the computer age started, from petty crimes such as performing weird functions on your computer to defacing, and now critical theft where even a country could even make an economy out of it. The first massive cybercrime attacks were back in 1989 when $70 million...
Continue Reading
Real Time Phishing is Man in the Middle (MitM) attack
Real Time Phishing is a Man-in-the-Middle (MitM) attack that allows the criminal to commit real time fraud. Stolen credentials from the phishing site are used to access the internet bank session in real time. Real time phishing allows the criminal to readily bypass banking authentication protocols. Real time phishing schemes take place over a web...
Continue Reading
Spear-phishing attack
Business Email Compromise (BEC) attacks Business Email Compromise (BEC), formerly known as Man-in-the-Email scams are a blended Spear-phishing attack. BEC attacks follow similar traits to phishing, technical subterfuge with social engineering. BEC threats actually compromise legitimate business email accounts in order to conduct unauthorised transfer of funds to criminal controlled bank accounts. Essentially the employee...
Continue Reading
Phishing Solution
gTLDs Phishing, Fraud, Abuse Observations – Top Level Domains (TLDs), such as .com, .org, .biz, .net, a part of the domain name that is installed in the root zone, now come in many different variations and flavours – such as generic TLDs (gTLDS), Country-Code TLDs (ccTLDS). These new TLDS have opened up the Domain Name...
Continue Reading
SMiShing
SMiShing – a phishing based threat against the Mobile Channel. SMiShing is a phishing based attack that leverages the Short Message Service (SMS) or phone based text message. SMiShing or Smishing has been around for many years now so it is not a new threat but a persistent threat that is evolving. With SMiShing the...
Continue Reading

Categories