Blog

The FraudWatch International Blog

Ransomware Protection: Security Tips to Lessen Your Chances of Falling Victim – Part 1

With the recent WannaCry and Petya ransomware attacks that crippled thousands of organisations around the world, FraudWatch International felt it was worthwhile to recap some of the steps both individuals and businesses can take to protect against ransomware attacks. In this week’s article, we will detail some of the areas consumers can look at.  Next […]

date:  Aug 10, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

Case Study: Retail Industry Threatened by… Fraudulent Social Media Pages

Customers engaging with retail brands are now moving online as a primary platform of communication, and the number of them doing so on Social Media is constantly increasing. With the rise of Social Media use globally by consumers and businesses are associated risks. How Are Cyber-Criminals Threatening Your Business Using Fraudulent Social Media Pages? Users […]

date:  Aug 02, 2017 comments:  0
by:  Blog Author category:  All, Social Media Read More

Android Users: Beware the New Malware LeakerLocker

A new variant of ransomware is spreading via phony apps on the Google Play Store which are targeting Android mobile users. Unlike traditional ransomware, this new strain, dubbed LeakerLocker, does not encrypt files on the victim’s device. Instead, it plays on fear rather than cryptography, by allegedly collecting personal images, messages and browsing history, and […]

date:  Jul 26, 2017 comments:  0
by:  Blog Author category:  All, Mobile Apps Read More

DMARC Protection with FraudWatch International

Last week, our blog article, DMARC: Protecting Your Domains explained what DMARC is, and how it can be used to protect your business from domain abuse. FraudWatch International is set to launch a new product to our clients, DMARC Protection, to assist our clients in setting up DMARC records and monitoring the reports that are […]

date:  Jul 19, 2017 comments:  0
by:  Blog Author category:  All, Corporate News Read More

DMARC: Protecting Your Domains

The effortlessness in the capability to generate fake emails has long been exploited by cyber-criminals as a mechanism to deploy spam, phishing attacks or malware, and has been so since the invention of email. DMARC is a simple way to give the receivers of an email the ability to validate the authenticity of an email, […]

date:  Jul 12, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Read More

Cyber-Criminality: Why Do Hackers Love Targeting Universities?

A recent spate of attacks have again highlighted that Universities are a prime target for cyber-criminals. Universities across the US as well as in the UK have reported multiple data breaches (some claiming to have been attacked up to 50 times) in the last 6-12 months and there is no sign of these attacks slowing […]

date:  Jul 05, 2017 comments:  0
by:  Blog Author category:  All, Phishing Read More

MacRansom Threatens Mac Users

Early this month, researchers started publishing warnings about a new, free, macOS-based ‘Ransomware as a Service’ (RaaS) which has recently emerged. The Mac specific ransomware has been dubbed ‘MacRansom’. The tool uses a web portal hosted in a TOR network, which is becoming a more popular method of attack. Note: A TOR Network is an […]

date:  Jun 28, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

Retail Industry Threatened by… Online Brand Abuse: Case Studies

The retail industry is one of the most targeted sectors by cyber-criminals, and for obvious reasons: it holds on to a large amount of data, handles money and represents a seemingly endless line of businesses to steal from. How Are Cyber-Criminals Threatening Businesses Using Online Brand Abuse? There are several types of online brand abuse […]

date:  Jun 21, 2017 comments:  0
by:  Blog Author category:  All, Brand Protection Read More

Beware of “Judy”, the Latest Android Mobile App Malware

In late May 2017, security researchers discovered Android malware in around 50 apps which were available on the Google Play Store. Known as “Judy”, named after the malicious apps’ character, the malware is installed in parallel when the infected app is installed to the Android device. Researchers explained that the Judy malware is “an auto-clicking […]

date:  Jun 14, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More