Brand Protection

Take Caution Before Entering

Taking Down Phishing in Banking

How Does Phishing Work? Phishing is an attack method used by cyber-criminals to covertly obtain the personal identity data and credentials of consumers through the use of social engineering and employment of malicious software. Social engineering methods deceive recipients into disclosing their credentials (such as usernames and passwords) and/or other personal data by using emails […]

date:  Feb 23, 2018 comments:  0
by:  Blog Author category:  Brand Abuse, Brand Protection, Expert Explanations Archives |, Phishing Read More
Unathorised use of a client's brand

Taking a Gamble on Your Brand

How Much Are You Willing to Wager? The world of online gambling is becoming increasingly popular as more and more people choose to use online services to seek entertainment from the comfort of their home.  Gambling is ripe for the picking when it comes to fooling users into visiting what “looks like” a legitimate website.  […]

date:  Nov 10, 2017 comments:  0
by:  Blog Author category:  Brand Abuse, Brand Protection, Image, Phishing Read More

Retail Industry Threatened by… Online Brand Abuse: Case Studies

The retail industry is one of the most targeted sectors by cyber-criminals, and for obvious reasons: it holds on to a large amount of data, handles money and represents a seemingly endless line of businesses to steal from. How Are Cyber-Criminals Threatening Businesses Using Online Brand Abuse? There are several types of online brand abuse […]

date:  Jun 21, 2017 comments:  0
by:  Blog Author category:  All, Brand Protection Read More

Have the Right Security Strategy

Information is a core asset to any business, and cyber-criminals know this. Your organisation needs to have a well thought out security strategy in place, to protect your most valuable assets. The first step to take is to determine what the right security investment is for your business. The following three areas need to be […]

date:  Aug 17, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection Read More

Cybersquatting – Into the Future – Part 4

In our last three blog articles, we’ve discussed Cybersquatting and Typosquatting and the issues it can cause for businesses. So what does the future hold for Cybersquatting in the following months, and years? Before we look forward, let’s take a look back at how domain names have evolved over the past few decades. In January […]

date:  May 18, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection Read More

Cybersquatting – Domain Name Disputes – Part 3

In previous articles, we have talked about the fact that multiple domain names can be registered by either cyber-criminals or legitimate businesses, to prevent others from using them. But what happens when the domain name that has already been registered is one you want to use for your new business, or it is actually in […]

date:  May 11, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection Read More

Cybersquatting – Typosquatting – Part 2

Previously, we talked about Cybersquatting (or Domain Squatting) and the fact that not all cybersquatting is malicious. Sometimes the domain names are just similar to other companies from across the world. Typosquatting, however, is more purposeful. It is a type of cybersquatting that aims to take advantage of common typographical errors made when a user […]

date:  May 04, 2016 comments:  1
by:  Blog Author category:  All, Brand Protection Read More

Cybersquatting – What is it? – Part 1

It’s easy to think of Domains as something you own; however, this is incorrect, as domains are rarely owned. Therefore, the concept of domains being a tradeable commodity is inherently a flawed one. Most domains are rented temporarily from a central agency, for a few years at a time. This has lead to some unethical […]

date:  Apr 27, 2016 comments:  3
by:  Blog Author category:  All, Brand Protection Read More

Presenting FraudWatch International’s Mobile Apps Protection

An increasing number of companies are providing their customers with the ability to use mobile applications (Apps) to access their online accounts. Mobile Apps are available from trusted stores (such as Apple’s iTunes, or Android’s Google Play), some not so trusted marketplaces, and also from websites on the internet. Criminals are turning to the mobile […]

date:  Apr 13, 2016 comments:  0
by:  Blog Author category:  All, Brand Protection Read More