Blog

The FraudWatch International Blog

Trickbot Malware: Beware of this New Banking Trojan!

In September 2016, researchers at Fidelis Cybersecurity discovered a new malware bot dubbed TrickBot or “TrickLoader” by its authors. They found that it had a lot in common with the infamous Dyre banking Trojan. Not only was the loader similar, but the code itself was very familiar, suggesting that some of the original Dyre authors […]

date:  Feb 22, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

Cyber-Criminality, Scams and Fraud: What to Expect in 2017

We said goodbye to 2016 and its head-scratching cyber-security issues, but the million-dollar question is: what will businesses and private users face now in 2017? Let’s review cyber-challenges this new year might hold in store: Tax fraud will be as relevant as ever: Americans, beware IRS scams Cyber-criminals are always very active during the tax […]

date:  Feb 08, 2017 comments:  0
by:  Blog Author category:  All, Industry News Read More

2016: The Year of DDoS Attacks

Last week, we discussed some of the main cyber-threats that occurred in 2016 and the lessons we can learn from them. The preeminent type of attack that occurred time and time again, was Distributed Denial of Service (DDoS). Amongst the most remarkable 2016 DDoS attacks were: Dyn, The US DNS service provider: For nearly 11 […]

date:  Feb 01, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

2016’s Important Lessons in Cyber-Security

The year 2016 will not only be remembered for Trump’s surprise victory in the US election, or for Brexit, or for saying goodbye to so many public figures like David Bowie, Alan Rickman, Prince, Muhammed Ali and Carrie Fisher, just to name a few. Last year was also one of the most challenging for cyber-security. […]

date:  Jan 25, 2017 comments:  0
by:  Blog Author category:  All, Industry News Read More

What is Point of Sale (POS) Malware?

A Point-Of-Sale (POS) terminal is a computerised version of a cash register. It has the ability to record and track customer orders, process credit and debit cards, connect to other systems in a network, and manage inventory. Most POS terminals contain a personal computer, which stores specific programs and I/O devices relevant to the company […]

date:  Jan 18, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

Data Breaches: Protect Your Business!

Businesses, as well as users, are at risk of data breaches. To achieve identity theft or launch spear phishing campaigns, cyber-criminals target businesses, companies and even governments that are dealing with large amounts of precious and critical personal information. Hardly a week goes by without the report of a new massive data breach, impacting thousands […]

date:  Jan 11, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

Insights from APWG’s 3rd Quarter 2016

The Anti-Phishing Working Group (APWG) is the worldwide coalition unifying the global response to cyber-crime across industry, government and law-enforcement sectors. The information in this article is a description of what is trending, according to APWG recently published Phishing Activity Trends Report for 3rd Quarter 2016. Phishing Activity Trends for 3rd Quarter 2016 The most […]

date:  Jan 04, 2017 comments:  0
by:  Blog Author category:  All, Industry News Read More

“Ho, Ho, Ho, Merry Phishing!” – Part 2

Mobile Shoppers, Beware of Mobile Treats! Today, our society is more Internet-connected than ever before: millions of sales are now done from a smartphone or tablet, and it’s especially true for holiday shopping. The amount of mobile shopping and transactions increases every year, with active buyers turning to their smartphones for their day-to-day shopping. Anyone […]

date:  Dec 21, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More