Expert Explanations Archives |

The Malware Evolution | FraudWatch International

The Malware Evolution: Trends in 2017, Outlook for 2018 and Protecting Your Business

Not unlike a biological virus adapting to a new host, malware is constantly evolving to adapt to the changing technology landscape. The new variants are more and more sophisticated, designed to exploit software vulnerabilities, penetrate online security and avoid detection. In this article, FraudWatch International looks at some of the biggest malware trends of the […]

date:  Jul 06, 2018 comments:  0
by:  Blog Author category:  Brand Protection, Expert Explanations Archives |, Malware Read More
FraudWatch Blog: CEO Fraud

CEO Fraud: The Biggest Concerns for Businesses and How to Prevent It

Your Company Is Vulnerable In the digital age, many businesses are concerned about data breaches. Considering that firms in every industry have become victims of hack attacks, this is a genuine concern. However, your company is probably even more susceptible to CEO fraud, because it doesn’t require elaborate hacking skills to pull off this kind of […]

date:  May 07, 2018 comments:  0
by:  Blog Author category:  All, Brand Abuse, Expert Explanations Archives |, Phishing, Social Media Read More

Taking Down Phishing in Banking

How Does Phishing Work? Phishing is an attack method used by cyber-criminals to covertly obtain the personal identity data and credentials of consumers through the use of social engineering and employment of malicious software. Social engineering methods deceive recipients into disclosing their credentials (such as usernames and passwords) and/or other personal data by using emails […]

date:  Feb 23, 2018 comments:  0
by:  Blog Author category:  Brand Abuse, Brand Protection, Expert Explanations Archives |, Phishing Read More
What is a Dolphin Attack?

What is… a Dolphin Attack?

A Dolphin attack is a term that has been given to the method of accessing a smartphone without the users’ consent by executing ultrasonic commands. Our Experts Explain Digital assistants, like Google’s Assistant, Apple’s Siri and Amazon’s Alexa, are becoming more and more popular as the world embraces this new Artificial Intelligence technology, built to […]

date:  Sep 28, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More
DMARC: Protecting Your Domains

DMARC: Protecting Your Domains

The effortlessness in the capability to generate fake emails has long been exploited by cyber-criminals as a mechanism to deploy spam, phishing attacks or malware, and has been so since the invention of email. DMARC is a simple way to give the receivers of an email the ability to validate the authenticity of an email, […]

date:  Jul 12, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More
What is Punycode Phishing? - Part 2

What is… Punycode Phishing? Part 2

Last week we discovered the use of Punycode phishing, a system that allows International Domain Names (IDNs) to be registered using characters that can’t be written in ASCII (American Standard Code for Information Interchange), easily tricking even the most advanced internet users by making the website address look legitimate. This week, we will focus on […]

date:  May 31, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More
What is Punycode Phishing? - Part 1

What is… Punycode Phishing? Part 1

What is it? Punycode is a system for converting words that can’t be written in ASCII (American Standard Code for Information Interchange), such as Ancient Greek. The phrase ΓΝΩΘΙΣΕΑΥΤΟΝ (“know yourself”), once converted into an ASCII characters, looks like this: xn--mxadglfwep7amk6b. This conversion system allows International Domain Names (IDNs), which include non-ASCII characters, to be […]

date:  May 24, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More
Online Wallets and Mobile Banking

Online Wallets and Mobile Banking

An online wallet (or digital wallet) is a program or web service that allows users to store and control their online shopping information (such as: usernames, passwords, shipping addresses and credit card details) in one central place. It also provides a convenient and quick method for consumers to make purchases from any person or store […]

date:  Apr 26, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More
Defending Against a Scareware Attack

Defending Against a Scareware Attack

In last week’s blog article, we discussed what scareware was and what it could do to your computer. In this article, our experts at FraudWatch International provide an insight into how to spot a scareware attack, the steps you can take if you think you have been a victim of an attack, and also handy […]

date:  Mar 15, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More
What is Scareware?

What is… Scareware?

What is it? Scareware is a type of malware that uses social engineering and fear tactics to trick victims into purchasing and downloading unwanted and potentially dangerous software. Our Experts Explain This class of malicious software (which also includes rogue security software and ransomware) misleads users into thinking that their computer has a virus, and […]

date:  Mar 08, 2017 comments:  0
by:  Blog Author category:  All, Expert Explanations Archives | Read More