Phishing

Ransomware Protection: Security Tips to Lessen Your Chances of Falling Victim – Part 2

As discussed in our previous article, small steps such as backing up files, using antivirus software, installing updates and always being security conscious can minimize the risks of users being infected with ransomware. In this week’s article, we provide security tips for business that can be used to minimize the threat of ransomware attacks. How […]

date:  Aug 16, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

Ransomware Protection: Security Tips to Lessen Your Chances of Falling Victim – Part 1

With the recent WannaCry and Petya ransomware attacks that crippled thousands of organisations around the world, FraudWatch International felt it was worthwhile to recap some of the steps both individuals and businesses can take to protect against ransomware attacks. In this week’s article, we will detail some of the areas consumers can look at.  Next […]

date:  Aug 10, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

Cyber-Criminality: Why Do Hackers Love Targeting Universities?

A recent spate of attacks have again highlighted that Universities are a prime target for cyber-criminals. Universities across the US as well as in the UK have reported multiple data breaches (some claiming to have been attacked up to 50 times) in the last 6-12 months and there is no sign of these attacks slowing […]

date:  Jul 05, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

Phishing for Influence: When Hackers Meddle in Politics

Every computer, whether used for personal or business reasons is susceptible to attacks from cyber-criminals. Political, personal and financial fraud are the three main reasons for these attacks. In the recent weeks, the French election has been the latest to enter political hack news, joining the United States, Germany and Norway who have all made […]

date:  May 11, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

Data Breaches: Protect Your Business!

Businesses, as well as users, are at risk of data breaches. To achieve identity theft or launch spear phishing campaigns, cyber-criminals target businesses, companies and even governments that are dealing with large amounts of precious and critical personal information. Hardly a week goes by without the report of a new massive data breach, impacting thousands […]

date:  Jan 11, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

“Ho, Ho, Ho, Merry Phishing!” – Part 2

Mobile Shoppers, Beware of Mobile Treats! Today, our society is more Internet-connected than ever before: millions of sales are now done from a smartphone or tablet, and it’s especially true for holiday shopping. The amount of mobile shopping and transactions increases every year, with active buyers turning to their smartphones for their day-to-day shopping. Anyone […]

date:  Dec 21, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

“Ho, Ho, Ho, Merry Phishing!” – Part 1

The holiday season is here again! Millions of people around the world are increasing their spending and scouring the internet for the best deals they can find. As sales increase worldwide, retailers and financial institutions are put at further risk as cyber-criminals are busy sending more phishing attacks than any other time throughout the year. […]

date:  Dec 14, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

Risky Celebrity Searches: Avoid Hackers’ Traps!

We all love finding out the latest celebrity gossip, but did you know that doing a simple Google search for your favourite celebrity can put your PC in harm’s way? Every year Intel Security publishes its McAfee Most Dangerous Celebrities™ report. 2016 marks the 10th edition of the report and it lists Aussie gals Rebel […]

date:  Oct 19, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More

Is Bluetooth as safe as you think?

Bluetooth is all about wireless communication. These days, we use Bluetooth technology everywhere – from headsets, which allow us to wirelessly operate our phones, to fitness devices that continuously log our health statistics and transmit them to our personal devices (phones, tablets, computers etc). The name “Bluetooth” is an Anglicised version of the Scandinavian Blåtand, […]

date:  Sep 28, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More