Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fraud

How To Avoid Credit Card Fraud Online

You can avoid credit card fraud online by securing your online accounts, avoiding saving your payment information on websites, being cautious of phishing scams, keeping a look out for credit card skimmers and more. Continue reading to learn more about how you can avoid credit card fraud online and how to report it if you’re a victim.

INETCO is Making Waves in the BC Tech Sector - INETCO is Named a Finalist for the Gamechanger Ambition Award

Each year, the BC Tech Association celebrates the remarkable achievements of the British Columbia technology community through the Technology Impact Awards (TIA). The Gamechanger – Ambition Award, is a testament to a company’s drive to address significant challenges, lead with conviction, and leverage technology to shape a better future.

Deepfakes: The Threat to Reality and How To Defend Against It

Deepfakes have emerged as a serious concern in the digital landscape, presenting a significant threat to truth and trust. While it can be fun to swap your face with the Mona Lisa, there are some significant concerns around how these can be used to deceive us. Let’s take a look at some of the methods used, and ways to spot red flags.

Cybercriminals Use Google Looker Studio to Host Crypto Scam to Steal Money and Credentials

Security researchers at Check Point have discovered yet another attack that leverages legitimate web applications to host attacks in order to bypass security scanners. One of the easiest ways for a security solution to spot a phishing attack is to evaluate the webpage a malicious link takes the recipient to.

TikTok Impersonations of Elon Musk Scam Victims of Their Bitcoin

There’s been a surge of Elon Musk-themed cryptocurrency scams on TikTok, BleepingComputer reports. The scammers inform the victims that they can claim their reward after spending a small amount of bitcoin (about $132) to activate their account. “BleepingComputer tested one of the giveaways to see how it works and found that almost all utilize the same template, which pretends to be a crypto investment platform,” BleepingComputer says.

Scam-as-a-Service Classiscam Expands Impersonation in Attacks to Include Over 250 Brands

Now entering its third year in business, the phishing platform, Classicam, represents the highest evolution of an “as a service” cybercrime, aiding more than 1000 attack groups worldwide. What do cybercriminals need for a successful attack? A convincing email, a list of potential target email addresses, and a website to extract payment details, bank login credentials, etc. And it’s the last part that’s usually the barrier to market for those that want to get into cybercrime.

How To Stay Safe From Zelle Scams

To stay safe from Zelle scams, you should only send Zelle payments to people you know, be wary of urgent payment requests, use a different app to send and receive payments from strangers, use strong passwords and enable Multi-Factor Authentication (MFA) on your banking accounts. Continue reading to learn about common Zelle scams and how to avoid falling victim to them.

Romance Scams That Run Your Crypto Wallet Dry

Scammers are using dating sites to lure victims into phony cryptocurrency investment schemes, according to Sean Gallagher at Sophos. These types of investment scams are known as “pig butchering,” loosely translated from the Chinese phrase “sha zhu pan.” In this case, the scammers convince the victim to participate in a liquidity pool arrangement, a legitimate but risky cryptocurrency investment technique.

New Scam Impersonates QuickBooks to Steal Credentials, Extract Money

Establishing urgency through a false need to “upgrade” or lose services, this new attack takes advantage of the widespread use of the popular accounting app to attract victims. Impersonation in phishing attacks only works if the target has an established rapport or relationship with the sender.