Scams

18Feb

10 Tell Tale Signs of Spyware and Adware Infection

Though there are no warning signs to indicate that spyware or adware is being installed on your system, there are several tell tale signs to alert you of their presence, once they install. I have compiled here for your convinence 10 tell tale signs that can warn you of the presence of adware or spyware on your computer. Here they are.
 
18Feb

Spoofing, Phishing, and Link Altering - Expensive Financial Traps

A growing rank of Internet crooks are now using new tricks called "phishing" and "spoofing" to steal your identity. Bogus e-mails that attempt to trick customers into giving out personal information are the hottest new scam on the Internet.
 
7Aug

Building the Human Firewall

It may be no surprise to some, but the biggest weakness in any firewall is in fact the operator. For all the most sophisticated systems, rules, and datasets we protect and guard... It is the operator in the chair who subverts their own security.
 
19Dec

Tracking spammers through their emails...

Spam. It has been a bane of network administrators, users, and phishing targets for as long as most users today have been alive (if you were born after the mid 1970s that is)... So how does one track the sender of an email message, or the source of a spam message? Simple, we need to read the metadata within the email itself.
 
19Aug

Prevent phishing from stealing your identity, and life.

Technology has brought along with it some offenders who have found many ingenious and malicious ways to leverage the world wide web to deceive people. They do this by robbing people of their individuality and their life savings through confidence scams (referred to here as phishing).
 
7Aug

A live Spear-Phishing attack in action...

A live demonstration of how a spear-phishing attack is conducted, and just how much damage an attacker can do once a user takes the bait.
 
7Aug

Spear-Phishing attack in action

Have you ever wondered what a spear-phishing attack can do within the space of 15 minutes? Well the Wolf Pack team have made a recording of a drive by infection which compromises the target PC in a matter of a few minutes.
 
7Aug

Phishing for beginners... what is it?

We've seen them all before, perhaps we have managed to filter them out with some creative email and spam filters... but any good network security officer should stay on top of spam reports. Why? Because it gives the Network Security Officer a clue to whether their business has been targetted for infiltration through spear-phishing.
 
11Aug

A simple example for how pretexting is done.

Pretexting is the act of inventing a scenario to engage a targetted victim in a conversation which may lead to increasing their vulnerability to confidence scams, or divulging sensitive information.