Posts by category
- Category: Account Takeover Scam
- Category: Active Scams
- Category: All
- Expert Explanation: COVID-19 Vaccination Scams. Be Aware!
- What Is Ransonware And How To Deal With It
- 3 Things To Teach Your Employees To Avoid Phishing
- The Risks Of Using Proxy Auto-Config Files And How To Circumvent Them
- eCommerce Fraud. A Growing Problem For Modern Businesses
- Common Mobile App Security Mistakes That Put You At Risk
- Expert Explanation: Brand Disruption from Malware Outside Your Network
- Brand Protection. Why Does Your Business Need It
- Online Brand Protection Strategies For Businesses
- Why Your Business App Needs to Undergo a Security Assessment
- Phishing Attacks. What It Is and the Consequences of an Attack
- Expert Explanation: Managing, Protecting & Monitoring Digital Risk
- Why You Need Cybersecurity Services for Social Media Marketing
- Top 3 Common Phishing Attacks You Should Know – Part 1
- Top 3 Common Phishing Attacks You Should Know – Part 2
- 3 Types of Phishing Threat Your Organisation Can Encounter
- Spoofing and Its Implications on Phishing Threats
- Phishing and Other Cyber Attacks: A Guide for Startups
- Expert Explanation: What is Mobile Phishing & Why is it on The Rise?
- Expert Explanation: Fake Celebrity Endorsements. They Aren’t Who They Seem
- How to Protect Your Business From Cybersecurity Threats
- Phishing Attacks: How to Spot Them and Protect Yourself From Them
- The Importance of Date Safety After an Employee is Fired
- Phishing and Spear Phishing: How to Avoid the Bait
- Understanding How Lookalike Domains Target Websites
- Brand Protection: 3 Cyber Threats You Should Prepare for
- The Truth About Digital Piracy: Everything You Need to Know
- Here’s How To Protect Your Company From Cyber Attacks
- How to Protect Your Employees from Phishing: Our Guide
- Why You Should Invest in Employee Awareness Training
- Expert Explanation: Discordapp and TikTok – What Are Our Kids Being Exposed To?
- 5 Tips to Protect Your IoT Mobile App from Cyber Attacks
- Common Cyberattacks That Can Put Your Company at Risk
- How to Protect Your WordPress Site from Cyberattacks
- The Importance of Investing in Cybersecurity
- Expert Explanation: COVID-19; More Screen Time – More Fake Apps
- Expert Explanation: Double Extortion – The Next Level
- 3 Ways Remote Work Will Affect Cybersecurity Trends in 2021
- 4 Tips to Protect Your Business from Phishing Treats in 2021
- Cyberthreats In Today’s Digital Age: All You Should Know
- 5 Effective Ways to Protect Your Business From Pharming
- Preparing Your Small Business for Phishing Attacks: Our Guide
- 4 Ways to Improve Cybersecurity of Your Business
- Debunking 3 Misconceptions about Cyber Threat Intelligence
- Expert Explanation: US Presidential Election Voter Fraud & Hacking
- 2 Facts About Ransomware and Your Cybersecurity in 2021
- 3 Tip to Prevent Internal Data Theft and Threats
- 4 Digital Hygiene Tips to Prevent Your Business from Ransomware
- How You Can Improve Cybersecurity and Protect Your Data
- Business Email Compromise: Is It Who It Seems?
- 4 Ways To Improve Your Cyber Security For The Holidays This 2020
- 5 Actionable Steps To Secure Your Business From Cyber Attacks
- The Most Shocking Malware Attacks That Happened In 2020
- What Can Business Owners Do To Protect Their IT Systems
- Expert Explanation: History of the Dark Web
- How To Protect Your Emails From Phishing Scams: Our Guide
- 4 Scams To Watch Out For During The Holiday Season
- 3 Ways To Protect Your Business From Phishing Scams
- 3 Ways To Protect Your Business From Spear-Phishing Attacks
- 5 Tips To Avoid Falling For Phishing Scams Amid The Holidays
- 5 Facts Hackers Do Not Want You To Know: How They Operate
- Expert Explanation: Double Extortion – Ransomware At Another Level
- Beware File Share Sites: How To Protect Yourself Against Phishing
- Cyber Threat Protection: 3 Things To Avoid Doing Immediately
- How To Protect Your Business From Cyberattacks During COVID-19
- Why Brand Protection Is Necessary For Your Business
- Cyberfraud Trends and Solutions for Business Owners in 2020
- Data Security for Business: Importance and Best Practices
- The Importance of Fraud Prevention Management Solutions
- The Latest Phishing Campaigns Amid COVID-19: What To Know
- 3 Common Cybersecurity Mistakes Small Businesses Must Avoid
- A Guide to Using Cloud Encryption to Secure Your Company
- How to Defend Your Business Against Phishing
- How to Set Up a Data Protection Strategy – Our Guide
- How Online Fraud Hurts Your Business and How to Fight Back
- Staying On Top of Cybersecurity in 2020
- The Importance of Taking Action Against Cyberattacks
- Fake Websites and Stolen Data: the Truth About Pharming
- 3 Lesser Known Facts About Cyber Threat Intelligence
- Cybersecurity 101 – 2 Signs to Detect Phishing Email Scams
- 4 of the Most Common Phishing Scams Committed in 2020
- Why You Need Digital Risk Protection for Your Business
- 2 Tips to Share With Your Employees for avoiding Online Fraud
- Future Proofing Your Workforce Through Cybersecurity
- Protect Your Brands Social Media Presence With These Steps
- What The Global Pandemic Has Shown About Cybersecurity
- Better Anti-Piracy: 2 Ways to Protect Software During the Pandemic
- Ransomware – What Business Owners Need to Know about It
- 5 Key Steps to Protect Your Site from Cyber Attacks in 2020
- Boost Your Cybersecurity – 3 Social Media Security Tips You Should Know
- Understanding Phishing And What you Can Do To Prevent It
- 3 Penetration Testing Trends You Need to Implement Now
- 3 Security Measures a Business Needs for Remote Workplaces
- 4 Ways to Keep Your Business Safe From Cyber Attacks
- Why You Need a Cybersecurity Agency – 4 Services Every SMB Needs
- 4 Business Security Tips to Keep Your Company Safe
- Phishing Protection Checklist
- 5 Common Digital Threats – How to Mitigate, Defend & Prevent
- Basics Business Guide – Online Fraud Prevention
- Ransomware attacks explained
- Filipino Hacking Groups
- Post COVID-19 Privacy Regulations
- Superannuation fraud in the era of the COVID-19
- COVID-19 and privacy. Do we still have our privacy?
- Coronavirus Scams:
- Why do I need Cyber Security Awareness Training for my employees?
- What is Pharming? and How to Reduce Your Risk
- Difference Between Phishing and Pharming
- Phishing Attack Trends for 2019
- What is a Phishing Attack? + Phishing Email Examples
- FraudWatch International Combats Brand Abuse with Image Recognition
- Malware Detection – 6 Basic Steps You Can Do Today
- What is Anti-Malware? Do You Need Anti-Malware Protection?
- What is Vishing? Voice Phishing Scams Explained & How to Prevent Them
- What is Mobile App Security? (Including 8 Application Security Tips)
- What is Cyber Security Awareness Training and Why is it so Important?
- Top 2018 Enterprise Security Trends
- Avoid These Top 3 Mistakes in Security Incident Response Planning
- The Evolution of Financial Crime in the Dark Web
- 3 Ways a Rogue Mobile App Can Harm Your Brand
- Cryptocurrency Exchanges – A Goldmine for Hackers
- How To Stop Phishing Emails in Their Tracks
- The Value of a Fast Takedown
- Protecting your business in 2018: 5 tips to ensure your business is cyber secure
- The rise of the fraudulent fake mobile app: How to protect your brand and business
- DMARC: What is it, Why Every Business Needs DMARC
- CEO Fraud: The Biggest Concerns for Businesses & Preventing CEO Scams
- Tax Time is Coming and so are the Scams
- Saving Face on Social Media
- Phishing Continues to be a Bank Theft Menace
- The Real Cost of a Ransomware Attack
- What is… a Dolphin Attack?
- Android Banking Trojan Now More Sophisticated
- Chrome Extension Hijacking – How Did It Happen?
- Introducing FraudWatch International New Product: Security Awareness
- Android Users: Beware the New Malware LeakerLocker
- DMARC Protection with FraudWatch International
- DMARC: Protecting Your Domains
- Cyber-Criminality: Why Do Hackers Love Targeting Universities?
- MacRansom Threatens Mac Users
- Retail Industry Threatened by… Online Brand Abuse: Case Studies
- Beware of “Judy”, the Latest Android Mobile App Malware
- UAE, the GCC region and the importance of increasing Phishing Awareness!
- What is… Punycode Phishing? Part 2
- What is… Punycode Phishing? Part 1
- WannaCry Ransomware Attack: A Breakdown
- Phishing for Influence: When Hackers Meddle in Politics
- Online Wallets and Mobile Banking
- Insights from APWG’s 4th Quarter 2016
- Learn How to Avoid IoT Threats!
- Latest IoT Cyber-Threat Trends
- Defending Against a Scareware Attack
- What is… Scareware?
- How Does the Trickbot Malware Work?
- Trickbot Malware: Beware of this New Banking Trojan!
- What is… a Romance Scam? Don’t get fooled by Valentine’s Day fever!
- Cyber-Criminality, Scams and Fraud: What to Expect in 2017
- 2016: The Year of DDoS Attacks
- 2016’s Important Lessons in Cyber-Security
- What is Point of Sale (POS) Malware?
- Data Breaches: Protect Your Business!
- Insights from APWG’s 3rd Quarter 2016
- Closing 2016 message from Trent Youl, FraudWatch International’s CEO
- “Ho, Ho, Ho, Merry Phishing!” – Part 2
- “Ho, Ho, Ho, Merry Phishing!” – Part 1
- Understanding the Dark Web – Part 2
- Understanding the Dark Web – Part 1
- The Versatility of Bitcoin
- What is… Cross-Site Scripting?
- Healthcare and Cyber-Criminality: The Challenge – Part 2
- Healthcare and Cyber-Criminality: The Challenge – Part 1
- Insights from APWG’s 2nd Quarter 2016
- Risky Celebrity Searches: Avoid Hackers’ Traps!
- What are…Bitcoins?
- What is…Cryptocurrency?
- Is Bluetooth as Safe as You Think?
- What is… Card Skimming?
- What is a…PUP (Potentially Unwanted Program)?
- What are… Phishing Kits?
- What is… an Advanced Persistent Threat (APT)?
- Have the Right Security Strategy
- Third Party Applications are Threatening Your Company’s Security!
- Trademarks are Crucial in Identifying and Protecting Your Brand Online
- The Importance of Having a Strong Password
- Macro Attacks on the Rise Again: a Successful Come Back
- Email Security: MX Records
- CEO Fraud – What is a BEC scam?
- Insights from APWG’s 1st Quarter 2016
- Presenting Site Takedown – Your Low Cost Business Protection
- SMiShing: Phishing in the Palm of Your Hand
- Presenting FraudWatch International’s Vishing Protection
- Don’t Fall Victim to Vishing!
- Cybersquatting – Into the Future – Part 4
- Cybersquatting: Domain Name Disputes – Part 3
- Cybersquatting – Typosquatting – Part 2
- Cybersquatting – What is it? – Part 1
- What is… cyber-defacement?
- Presenting FraudWatch International’s Mobile Apps Protection
- Trending: Mobile Malware Attacks
- What to do if your website has been hacked?
- Presenting FraudWatch International’s Pharming Protection
- Google Safe Browsing
- Preventing Malvertising Attacks
- Types of Malvertising – Part 3
- Presenting FraudWatch International’s Social Media Protection
- Security Tips – Social Media and Mobile Devices
- Types of Malvertising – Part 2
- Types of Malvertising – Part 1
- What is Malvertising?
- Security Risks with Social Networking – Part 1
- A Message from Trent Youl, our CEO
- What is… a man-in-the-browser attack?
- What is… a man-in-the-middle attack?
- Introducing FraudWatch International’s Expert Explanations
- How to protect your PC from email attachment Malware – Part 3
- Hackers Hold UAE Bank to Ransom
- How to protect your PC from email attachment Malware – Part 2
- How to protect your PC from email attachment Malware – Part 1
- Presenting FraudWatch International’s Malware Protection
- The Cloud – Part 3
- The Cloud – Part 2
- The Cloud – Part 1
- The Importance of Cyber Security Training
- Phishing Leads to More Phishing
- Understanding the Internet of Things (IoT)
- Signs of Malware Infection
- VBE Malware VS Malware Analysis Sandboxes
- Presenting FraudWatch International’s Brand Abuse Service
- PAC Files – A Legitimate Tool Hijacked
- e-Crime Australia 2015 – For the First Time in Melbourne!
- Dangers of Using Content Managing Systems
- DNS Protection and Why Your Business Shouldn’t Ignore It
- Internal DNS Monitoring & Restrictions
- Fake Domain Name Registration
- Email Attachment Phishing
- Australian Taxation Office Refund Phishing Scam
- Presenting FraudWatch International’s Log Monitor
- Using Referral Logs to Detect Attacks
- Pharming: Going Further
- How FraudWatch International Can Support Your Company Against Phishing Attacks
- Insights from APWG’s 4th quarter 2014 report
- Brazilian Malware is Evolving
- SQL Server Drop Zone and Trojan: A Case Study
- Who is responsible for brand protection?
- Malware Hiding in Plain Sight: Bad Neighbours on Social Networks
- Pharming: how to identify it, impacts & risks
- How to Identify and Avoid Rogue Mobile Apps
- Protect Yourself Against Malware
- Are Your Passwords Secure?
- Don’t Fall For Ransomware!
- How to Identify Phishing
- What to Expect in 2015 – Cybercrime Predictions from FraudWatch International
- A Look Back on 2014
- Category: Brand Abuse
- Category: Brand Protection
- Category: Corporate News
- Category: Cyber Security
- Category: Dark Web
- Category: Digital Risk Protection
- Category: DMARC
- Category: Expert Explanations
- Category: false impersonation
- Category: Financial Services
- Category: Healthcare
- Category: Impersonation Social Media
- Category: Industry News
- Category: Malware
- Category: Mobile Apps
- Category: Pharming
- Category: Phishing
- Category: Security Awareness
- Category: Small Business
- Category: Social Engineering
- Category: Social Media
- Category: Uncategorized
- Category: Vishing