


The Malware Evolution: Trends in 2017, Outlook for 2018 and Protecting Your Business
Not unlike a biological virus adapting to a new host, malware is constantly evolving to adapt to the changing technology landscape. The new variants are more and more sophisticated, designed to exploit software vulnerabilities, penetrate online security and avoid detection. In this article, FraudWatch International looks at some of the biggest malware trends of the […]

CEO Fraud: The Biggest Concerns for Businesses & Preventing CEO Scams
Your Company Is Vulnerable to CEO Scams & CEO Fraud In the digital age, many businesses are concerned about data breaches. Considering that firms in every industry have become victims of hack attacks, this is a genuine concern. However, your company is probably even more susceptible to CEO fraud, because it doesn’t require elaborate hacking skills […]

Taking Down Phishing in Banking
How Does Phishing Work? Phishing is an attack method used by cyber-criminals to covertly obtain the personal identity data and credentials of consumers through the use of social engineering and employment of malicious software. Social engineering methods deceive recipients into disclosing their credentials (such as usernames and passwords) and/or other personal data by using emails […]

What is… a Dolphin Attack?
A Dolphin attack is a term that has been given to the method of accessing a smartphone without the users’ consent by executing ultrasonic commands. Our Experts Explain Digital assistants, like Google’s Assistant, Apple’s Siri and Amazon’s Alexa, are becoming more and more popular as the world embraces this new Artificial Intelligence technology, built to […]

DMARC: Protecting Your Domains
The effortlessness in the capability to generate fake emails has long been exploited by cyber-criminals as a mechanism to deploy spam, phishing attacks or malware, and has been so since the invention of email. DMARC is a simple way to give the receivers of an email the ability to validate the authenticity of an email, […]

What is… Punycode Phishing? Part 2
Last week we discovered the use of Punycode phishing, a system that allows International Domain Names (IDNs) to be registered using characters that can’t be written in ASCII (American Standard Code for Information Interchange), easily tricking even the most advanced internet users by making the website address look legitimate. This week, we will focus on […]

What is… Punycode Phishing? Part 1
What is it? Punycode is a system for converting words that can’t be written in ASCII (American Standard Code for Information Interchange), such as Ancient Greek. The phrase ΓΝΩΘΙΣΕΑΥΤΟΝ (“know yourself”), once converted into an ASCII characters, looks like this: xn--mxadglfwep7amk6b. This conversion system allows International Domain Names (IDNs), which include non-ASCII characters, to be […]

Online Wallets and Mobile Banking
An online wallet (or digital wallet) is a program or web service that allows users to store and control their online shopping information (such as: usernames, passwords, shipping addresses and credit card details) in one central place. It also provides a convenient and quick method for consumers to make purchases from any person or store […]

Defending Against a Scareware Attack
In last week’s blog article, we discussed what scareware was and what it could do to your computer. In this article, our experts at FraudWatch International provide an insight into how to spot a scareware attack, the steps you can take if you think you have been a victim of an attack, and also handy […]