Every computer, whether used for personal or business reasons is susceptible to attacks from cyber-criminals. Political, personal and financial fraud are the three main reasons for these attacks.
An online wallet (or digital wallet) is a program or web service that allows users to store and control their online shopping information (such as: usernames, passwords, shipping addresses and credit card details) in one central place. It also provides a convenient and quick method for consumers to make purchases from any person or store world-wide.
Fake brand profiles are a plague on social media, and their risks and dangers shouldn’t be underestimated. Since the beginning of our new connected world, companies have been encouraged to have a presence on social media networks and engage with their followers and fans; but as always, criminals followed them on this new journey.
Do you own a business or have a social media presence? Are you part of the Marketing or Security team within your company? If you answered “Yes,” then you need to be aware of the latest scam being used by cyber-criminals to damage your brand reputation and steal from your business: watch out for angler phishing!
The Anti-Phishing Working Group (APWG) is the worldwide coalition unifying the global response to cyber-crime across industry, government and law-enforcement sectors. The information in this article is a description of what is trending, according to APWG recently published Phishing Activity Trends Report for 4th Quarter 2016.
The Internet of Things (IoT) is now a sign of the times. We have digitally connected devices all around us – at work, in our cars and homes, and even on our bodies. With the arrival of IPv6 and the wide use of Wi-Fi networks, IoT is expanding at a rapid rate. Researchers estimate that by 2020, the number of active wireless connected devices will be in...
In last week's blog article, we discussed what scareware was and what it could do to your computer. In this article, our experts at FraudWatch International provide an insight into how to spot a scareware attack, the steps you can take if you think you have been a victim of an attack, and also handy tips on defending against an attack.