Blog

The FraudWatch International Blog
84_bluetooth

Is Bluetooth as safe as you think?

Bluetooth is all about wireless communication. These days, we use Bluetooth technology everywhere – from headsets, which allow us to wirelessly operate our phones, to fitness devices that continuously log our health statistics and transmit them to our personal devices (phones, tablets, computers etc). The name “Bluetooth” is an Anglicised version of the Scandinavian Blåtand, […]

date:  Sep 28, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
83_card-skimming

What is… Card Skimming?

What is it? Card Skimming is the act of using a portable device to illegally collect data from the magnetic strip of a credit, debit or ATM card. Victims of credit card skimming are often unaware of the theft until they notice fraudulent charges on their accounts or discover that money has been withdrawn. Their […]

date:  Sep 21, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More
82_pup_new

What is a…PUP (Potentially Unwanted Program)?

What is it? A Potentially Unwanted Program, or PUP for short, is a program that may be unwanted, despite the fact that a user consented to download it. Some examples of PUPs include: spyware, adware, or additional web browser toolbars, and they are often downloaded in conjunction with a program that the user actually wants. […]

date:  Sep 14, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More
81_Phish kits

What are… Phishing Kits?

There is no denying that phishing is on the rise. As we posted in a previous blog, the Anti-Phishing Work Group (APWG) observed that the number of unique phishing websites rose by a staggering 250% over the six months from October 2015 to March 2016. So why has this occurred? Here at FraudWatch International we […]

date:  Sep 07, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More
80_APT

What is… an Advanced Persistent Threat (APT)?

What is it? An Advanced Persistent Threat (APT) is a network attack in which an unauthorised person gains access to a network and remains undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organisation. In general, APT attacks […]

date:  Aug 24, 2016 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More
79_HAVE THE RIGHT SECURITY STRATEGY

Have the Right Security Strategy

Information is a core asset to any business, and cyber-criminals know this. Your organisation needs to have a well thought out security strategy in place, to protect your most valuable assets. The first step to take is to determine what the right security investment is for your business. The following three areas need to be […]

date:  Aug 17, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection Read More
78_ Third Party Apps are Threatening Your Company’s Security!

Third Party Applications are Threatening Your Company’s Security!

Shadow IT is a term that refers to any application (apps) that a company’s employees utilise without obtaining IT approval. With the ever-growing list of apps available, Shadow IT is increasing exponentially and with more businesses moving their data onto Cloud platforms, the biggest risk is posed by connected third-party applications. CloudLock, a cloud security […]

date:  Aug 10, 2016 comments:  0
by:  Blog Author category:  All, Mobile Apps Read More
76_The Importance of Having a Strong Password

The Importance of Having a Strong Password

The amount of time the average person spends online is constantly increasing. There is a plethora of tasks – banking, shopping, TV viewing, chatting with friends, studying – that people carry out online on a daily basis, and there is always something new, just around the corner, which will drag us back to our PCs […]

date:  Jul 27, 2016 comments:  0
by:  Blog Author category:  All, Malware, Phishing Read More