Phishing

76_The Importance of Having a Strong Password

The Importance of Having a Strong Password

The amount of time the average person spends online is constantly increasing. There is a plethora of tasks – banking, shopping, TV viewing, chatting with friends, studying – that people carry out online on a daily basis, and there is always something new, just around the corner, which will drag us back to our PCs […]

date:  Jul 27, 2016 comments:  0
by:  Blog Author category:  All, Malware, Phishing Read More
74_Email Security, MX Records

Email Security: MX Records

In last week’s blog, our experts provided an explanation on what a Business Email Compromise (BEC) scam involves. Employees, and/or business partners, are strategically targeted with emails appearing to be from a trusted source (a CEO or manager). To deliver even more deception, the email content is meticulously designed, using corporate email signatures, and sometimes […]

date:  Jul 13, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
69_SMiShing in the Palm of Your Hand

SMiShing: Phishing in the Palm of Your Hand

Text messaging is one of the most common features used on mobile phones. There are billions of text messages received around the world each day, and a growing number of these are spam, phishing, or other malicious attacks. Many people assume mobile phones are safe, and don’t realise that malware and phishing attacks are also […]

date:  Jun 08, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
68_ Presenting FraudWatch International’s Vishing Protection

Presenting FraudWatch International’s Vishing Protection

A Method of Social Engineering The practice of Vishing (aka Voice Phishing) has been around for many years. Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be from a legitimate business. Over […]

date:  Jun 01, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
67_Don’t fall Victim to Vishing!

Don’t fall Victim to Vishing!

In today’s world of online communications and the associated threats, you could be forgiven for thinking that the “old-fashioned” ways of contacting someone, like a phone call, would be safer. Unfortunately, this is not the case. Whilst email scams are still a significant money earner for cyber-criminals, phone scams are becoming more and more popular. […]

date:  May 25, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
59_What to do if your website has been hacked

What to do if your website has been hacked?

In a previous blog article, we discussed the Google Safe Browsing service that Google provides, which blacklists URLs for websites that contain malware or phishing content. This is a great feature that helps to protect users from visiting malicious websites. But, what if your website ends up on the blacklist? How do you remove it, […]

date:  Mar 30, 2016 comments:  0
by:  Blog Author category:  All, Phishing Read More
Chrome1

Google Safe Browsing

Google Safe Browsing is a service offered by Google that provides lists of URLs for websites that contain malware or phishing content. This is known as a Blacklist. The Google Chrome, Apple Safari and Mozilla Firefox web browsers all use the Google Safe Browsing blacklist to check pages for potential threats. According to a Google […]

date:  Mar 09, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection, Malware, Phishing Read More
blog_29

Phishing leads to more phishing

Our Phishing Team at FraudWatch International have been seeing an increase in attacks on web hosting websites. Most people, who have a website, would use a web hosting company to publish their site, and would have a web hosting account to manage their files. “Go Daddy” is one of the biggest web host companies in […]

date:  Oct 06, 2015 comments:  Comments Off on Phishing leads to more phishing
by:  Blog Author category:  All, Brand Protection, Phishing Read More
blog_19

Dangers of Using Content Managing Systems

A number of small businesses utilise Content Management Systems (CMS) to build their websites. There are many free online programs that create the web pages and content, with the author needing very little knowledge of HTML. This can be a quick and cost effective solution for small businesses that need to gain a web presence […]

date:  Aug 19, 2015 comments:  Comments Off on Dangers of Using Content Managing Systems
by:  Blog Author category:  All, Brand Protection, Phishing Read More