Blog

The FraudWatch International Blog

Latest IoT Cyber-Threats Trends

The Internet of Things (IoT) is now a sign of the times. We have digitally connected devices all around us – at work, in our cars and homes, and even on our bodies. With the arrival of IPv6 and the wide use of Wi-Fi networks, IoT is expanding at a rapid rate. Researchers estimate that […]

date:  Mar 22, 2017 comments:  0
by:  Blog Author category:  All, Industry News Read More

Defending Against a Scareware Attack

In last week’s blog article, we discussed what scareware was and what it could do to your computer. In this article, our experts at FraudWatch International provide an insight into how to spot a scareware attack, the steps you can take if you think you have been a victim of an attack, and also handy […]

date:  Mar 15, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

What is… Scareware?

What is it? Scareware is a type of malware that uses social engineering and fear tactics to trick victims into purchasing and downloading unwanted and potentially dangerous software. Our Experts Explain This class of malicious software (which also includes rogue security software and ransomware) misleads users into thinking that their computer has a virus, and […]

date:  Mar 08, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

How Does the Trickbot Malware Works

Last week, we talked about a new banking Trojan, called TrickBot, that is plaguing banks all around the world, including the US, UK and Australia. In this article, we will take in inside look at how the Trojan works. TrickBot has made its way into the banking sector over recent months by using a malvertising […]

date:  Mar 01, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

Trickbot Malware: Beware of this New Banking Trojan!

In September 2016, researchers at Fidelis Cybersecurity discovered a new malware bot dubbed TrickBot or “TrickLoader” by its authors. They found that it had a lot in common with the infamous Dyre banking Trojan. Not only was the loader similar, but the code itself was very familiar, suggesting that some of the original Dyre authors […]

date:  Feb 22, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

Cyber-Criminality, Scams and Fraud: What to Expect in 2017

We said goodbye to 2016 and its head-scratching cyber-security issues, but the million-dollar question is: what will businesses and private users face now in 2017? Let’s review cyber-challenges this new year might hold in store: Tax fraud will be as relevant as ever: Americans, beware IRS scams Cyber-criminals are always very active during the tax […]

date:  Feb 08, 2017 comments:  0
by:  Blog Author category:  All, Industry News Read More

2016: The Year of DDoS Attacks

Last week, we discussed some of the main cyber-threats that occurred in 2016 and the lessons we can learn from them. The preeminent type of attack that occurred time and time again, was Distributed Denial of Service (DDoS). Amongst the most remarkable 2016 DDoS attacks were: Dyn, The US DNS service provider: For nearly 11 […]

date:  Feb 01, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

2016’s Important Lessons in Cyber-Security

The year 2016 will not only be remembered for Trump’s surprise victory in the US election, or for Brexit, or for saying goodbye to so many public figures like David Bowie, Alan Rickman, Prince, Muhammed Ali and Carrie Fisher, just to name a few. Last year was also one of the most challenging for cyber-security. […]

date:  Jan 25, 2017 comments:  0
by:  Blog Author category:  All, Industry News Read More

What is Point of Sale (POS) Malware?

A Point-Of-Sale (POS) terminal is a computerised version of a cash register. It has the ability to record and track customer orders, process credit and debit cards, connect to other systems in a network, and manage inventory. Most POS terminals contain a personal computer, which stores specific programs and I/O devices relevant to the company […]

date:  Jan 18, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More