Phishing

Data Breaches: Protect Your Business!

Businesses, as well as users, are at risk of data breaches. To achieve identity theft or launch spear phishing campaigns, cyber-criminals target businesses, companies and even governments that are dealing with large amounts of precious and critical personal information. Hardly a week goes by without the report of a new massive data breach, impacting thousands […]

date:  Jan 11, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

“Ho, Ho, Ho, Merry Phishing!” – Part 2

Mobile Shoppers, Beware of Mobile Treats! Today, our society is more Internet-connected than ever before: millions of sales are now done from a smartphone or tablet, and it’s especially true for holiday shopping. The amount of mobile shopping and transactions increases every year, with active buyers turning to their smartphones for their day-to-day shopping. Anyone […]

date:  Dec 21, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

“Ho, Ho, Ho, Merry Phishing!” – Part 1

The holiday season is here again! Millions of people around the world are increasing their spending and scouring the internet for the best deals they can find. As sales increase worldwide, retailers and financial institutions are put at further risk as cyber-criminals are busy sending more phishing attacks than any other time throughout the year. […]

date:  Dec 14, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

Risky Celebrity Searches: Avoid Hackers’ Traps!

We all love finding out the latest celebrity gossip, but did you know that doing a simple Google search for your favourite celebrity can put your PC in harm’s way? Every year Intel Security publishes its McAfee Most Dangerous Celebrities™ report. 2016 marks the 10th edition of the report and it lists Aussie gals Rebel […]

date:  Oct 19, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

Is Bluetooth as safe as you think?

Bluetooth is all about wireless communication. These days, we use Bluetooth technology everywhere – from headsets, which allow us to wirelessly operate our phones, to fitness devices that continuously log our health statistics and transmit them to our personal devices (phones, tablets, computers etc). The name “Bluetooth” is an Anglicised version of the Scandinavian Blåtand, […]

date:  Sep 28, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

The Importance of Having a Strong Password

The amount of time the average person spends online is constantly increasing. There is a plethora of tasks – banking, shopping, TV viewing, chatting with friends, studying – that people carry out online on a daily basis, and there is always something new, just around the corner, which will drag us back to our PCs […]

date:  Jul 27, 2016 comments:  0
by:  Blog Author category:  All, Malware, Phishing Read More

Email Security: MX Records

In last week’s blog, our experts provided an explanation on what a Business Email Compromise (BEC) scam involves. Employees, and/or business partners, are strategically targeted with emails appearing to be from a trusted source (a CEO or manager). To deliver even more deception, the email content is meticulously designed, using corporate email signatures, and sometimes […]

date:  Jul 13, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

SMiShing: Phishing in the Palm of Your Hand

Text messaging is one of the most common features used on mobile phones. There are billions of text messages received around the world each day, and a growing number of these are spam, phishing, or other malicious attacks. Many people assume mobile phones are safe, and don’t realise that malware and phishing attacks are also […]

date:  Jun 08, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

Presenting FraudWatch International’s Vishing Protection

A Method of Social Engineering The practice of Vishing (aka Voice Phishing) has been around for many years. Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be from a legitimate business. Over […]

date:  Jun 01, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More