FraudWatch International Blog

The FraudWatch International Blog

You are here: Home » Blog

What is... Punycode Phishing? Part 1

What is it?

date:  May 24, 2017

WannaCry Ransomware Attack: A Breakdown

A recent global attack, WannaCry ransomware has successfully targeted big organisations from the UK's Health Care system to car factories in France.

date:  May 18, 2017

Phishing for Influence: When Hackers Meddle in Politics

Every computer, whether used for personal or business reasons is susceptible to attacks from cyber-criminals. Political, personal and financial fraud are the three main reasons for these attacks.

date:  May 11, 2017

Online Wallets and Mobile Banking

An online wallet (or digital wallet) is a program or web service that allows users to store and control their online shopping information (such as: usernames, passwords, shipping addresses and credit card details) in one central place. It also provides a convenient and quick method for consumers to make purchases from any person or store world-wide.

date:  April 26, 2017

Angler Phishing: The Risks and Dangers of Fake Social Media Brand Profiles – Part 2

Fake brand profiles are a plague on social media, and their risks and dangers shouldn’t be underestimated. Since the beginning of our new connected world, companies have been encouraged to have a presence on social media networks and engage with their followers and fans; but as always, criminals followed them on this new journey.

date:  April 19, 2017

Angler Phishing: The Risks and Dangers of Fake Social Media Brand Profiles – Part 1

Do you own a business or have a social media presence? Are you part of the Marketing or Security team within your company? If you answered “Yes,” then you need to be aware of the latest scam being used by cyber-criminals to damage your brand reputation and steal from your business: watch out for angler phishing!

date:  April 13, 2017

Insights from APWG’s 4th Quarter 2016

The Anti-Phishing Working Group (APWG) is the worldwide coalition unifying the global response to cyber-crime across industry, government and law-enforcement sectors. The information in this article is a description of what is trending, according to APWG recently published Phishing Activity Trends Report for 4th Quarter 2016.

date:  April 05, 2017

Learn How to Avoid IoT Threats!

Every aspect of our lives is becoming 'Internet-ready" and last week, we detailed some of the devices hackers have been able to use the Internet of Things (IoT) to steal our information or spy on us.

date:  March 29, 2017

Latest IoT Cyber-Threats Trends

The Internet of Things (IoT) is now a sign of the times. We have digitally connected devices all around us – at work, in our cars and homes, and even on our bodies. With the arrival of IPv6 and the wide use of Wi-Fi networks, IoT is expanding at a rapid rate. Researchers estimate that by 2020, the number of active wireless connected devices will be in...

date:  March 22, 2017

Defending Against a Scareware Attack

In last week's blog article, we discussed what scareware was and what it could do to your computer. In this article, our experts at FraudWatch International provide an insight into how to spot a scareware attack, the steps you can take if you think you have been a victim of an attack, and also handy tips on defending against an attack.

date:  March 15, 2017
No More Posts