Phishing

87_riscky-celebs-search

Risky Celebrity Searches: Avoid Hackers’ Traps!

We all love finding out the latest celebrity gossip, but did you know that doing a simple Google search for your favourite celebrity can put your PC in harm’s way? Every year Intel Security publishes its McAfee Most Dangerous Celebrities™ report. 2016 marks the 10th edition of the report and it lists Aussie gals Rebel […]

date:  Oct 19, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
84_bluetooth

Is Bluetooth as safe as you think?

Bluetooth is all about wireless communication. These days, we use Bluetooth technology everywhere – from headsets, which allow us to wirelessly operate our phones, to fitness devices that continuously log our health statistics and transmit them to our personal devices (phones, tablets, computers etc). The name “Bluetooth” is an Anglicised version of the Scandinavian Blåtand, […]

date:  Sep 28, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
76_The Importance of Having a Strong Password

The Importance of Having a Strong Password

The amount of time the average person spends online is constantly increasing. There is a plethora of tasks – banking, shopping, TV viewing, chatting with friends, studying – that people carry out online on a daily basis, and there is always something new, just around the corner, which will drag us back to our PCs […]

date:  Jul 27, 2016 comments:  0
by:  Blog Author category:  All, Malware, Phishing Read More
74_Email Security, MX Records

Email Security: MX Records

In last week’s blog, our experts provided an explanation on what a Business Email Compromise (BEC) scam involves. Employees, and/or business partners, are strategically targeted with emails appearing to be from a trusted source (a CEO or manager). To deliver even more deception, the email content is meticulously designed, using corporate email signatures, and sometimes […]

date:  Jul 13, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
69_SMiShing in the Palm of Your Hand

SMiShing: Phishing in the Palm of Your Hand

Text messaging is one of the most common features used on mobile phones. There are billions of text messages received around the world each day, and a growing number of these are spam, phishing, or other malicious attacks. Many people assume mobile phones are safe, and don’t realise that malware and phishing attacks are also […]

date:  Jun 08, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
68_ Presenting FraudWatch International’s Vishing Protection

Presenting FraudWatch International’s Vishing Protection

A Method of Social Engineering The practice of Vishing (aka Voice Phishing) has been around for many years. Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be from a legitimate business. Over […]

date:  Jun 01, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
67_Don’t fall Victim to Vishing!

Don’t fall Victim to Vishing!

In today’s world of online communications and the associated threats, you could be forgiven for thinking that the “old-fashioned” ways of contacting someone, like a phone call, would be safer. Unfortunately, this is not the case. Whilst email scams are still a significant money earner for cyber-criminals, phone scams are becoming more and more popular. […]

date:  May 25, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
59_What to do if your website has been hacked

What to do if your website has been hacked?

In a previous blog article, we discussed the Google Safe Browsing service that Google provides, which blacklists URLs for websites that contain malware or phishing content. This is a great feature that helps to protect users from visiting malicious websites. But, what if your website ends up on the blacklist? How do you remove it, […]

date:  Mar 30, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
Chrome1

Google Safe Browsing

Google Safe Browsing is a service offered by Google that provides lists of URLs for websites that contain malware or phishing content. This is known as a Blacklist. The Google Chrome, Apple Safari and Mozilla Firefox web browsers all use the Google Safe Browsing blacklist to check pages for potential threats. According to a Google […]

date:  Mar 09, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection, Malware, Phishing Read More