Tag

phishing sites
Phishing Modus Using WhatsApp
What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners...
Continue Reading
AI and Phishing
AI and Phishing: Best Offense or Great Defense The term AI is most often misinterpreted. There are people thinking of the T-1000 or those terminator robots that were trying to hunt down John Connor and eventually leads to the creation of SkyNet and towards the end of the world as we know it. These clichéd...
Continue Reading
Cybersecurity
You might have heard of the threats that are built into machines, and the ones that are created by people to exploit loopholes in any given system. We’re all aware of the malwares and viruses, the phishing sites, fake accounts, and everything digital threat that exists in this day and age. But let’s throw it...
Continue Reading
Anti Phishing
With the latest boom where a growing number of users trading Cryptocurrencies has caught the attention of cyber-criminals who dares to take advantage of this craze in order to gain their own fortune. It is quite alarming to acknowledge that scammers were on the loose to bring misfortune for their own fortune through methods such...
Continue Reading
Cryptojacking Introduction
Mining for a stranger? How about a no? Trick and Cyber threats on the cyber world never seems to end, because it just keeps on evolving. Another thing to watch out for on the list of unseen threats through the eyes of our unsuspecting users is what we call “Cryptojacking”. Due to the rise and...
Continue Reading
Phishing Protection
Phishing protection, protecting the business and end user victims, requires a layered approach. Although we have discussed the limitation of end user protection at the browser level, we still recommend User use this point of protection. Browser plugins provide phishing protection against phishing sites. In this article, we review some common desktop applications that can...
Continue Reading
traditional phishing
It may be a new year but we can be sure that phishing will again be upon us. So far in the first two days of 2017 we have seen the usual suspects being targeted, Apple, PayPal, Amazon, Scotia Bank, ANZ, HSBC, Facebook, the list of targeted phishing is endless…. Phishing first came to light...
Continue Reading
Shutterstock izoologic
Cybercriminals still use emails to launch the social engineering component of a phishing or malware attack. Email content uses a “call to action’ such as a security update, web payment or refund to lure victims into clicking on the embedded link. Users are routed to fake web content or to download malicious attachment and executables....
Continue Reading
SMiShing
SMiShing attacks often leverage a trusted brand to route the victim to a phishing site. An alternative variant of SMiShing is where the spam message contains only a call back number. The message maybe as simple as “Please urgently call back xxxx xxxx xxxx to update your account details” and there is no mention of...
Continue Reading
Real Time Phishing
Real Time Phishing is a Man-in-the-Middle (MitM) attack that allows the criminal to commit real time fraud. Stolen credentials from the phishing site are used to access the internet bank session in real time. Real time phishing allows the criminal to readily bypass banking authentication protocols. Real time phishing schemes take place over a web...
Continue Reading
1 2