Posts

Showing posts from October, 2019

Here’s how a malicious website could infect your iPhone

Image
If you are under the impression that your iPhone is immune to malicious threats, then you are living in the past. Even though Apple iPhones are a smaller target then Android phones, it is possible to become infected by simply opening a website. Infected websites can install malware as well as spyware on your device; from there they work in the background without you even noticing it is there! The consequences of your device being infected can be serious, all your passwords, messages, call history, photos, etc. can be compromised, so always be sure to exercise caution. Here’s how to avoid infecting your Apple iPhone with malicious malware… - Make sure you regularly update your phone and ensure it is running the latest version of iOS. Always download all the updates as soon as they become available. Developers fix the issues that cybercriminals take advantage of in all the latest versions. - Never click on links in ads, emails or messages, like SMSs from someone

How to Spot an Online Charity Scam

Image
Social media sites such as Facebook have a range of scams, one of the most recent being fake fundraising campaigns! The scammers will make an emotional post, provide their banking details and add a couple of sad comments as well. The post will usually be a plea for help for a terminally ill child or to help an animal rescue organization. New scamming groups appear every month, each with similar details and posts and even though they are shut down on a regular basis, people still fall for the scam and pay money to the scammers anyway. How can you spot an online charity scam? Age of the group. The fake charity group will only be a few weeks old and contain barely any posts, but they have been shared and reposted thousands of times. This is usually the first signs that the charity is a scam! A real organization or charity will take a long period of time to become established and there will be multiple posts as well as more information about the cause. Pressure to

What is Social Engineering?

Image
Social engineering is the act of manipulating people online into doing certain things such as revealing their private information or passwords! This type of online manipulation takes advantage of a victim’s naivety and willingness to help and please others, and it plays a part in many other types of online scamming. Here are some examples of social engineering: You receive an email claiming to be from your bank or a trusted organization . They ask you to click on a link and input your details such as your password and other personal information. This is usually called phishing! Someone phones you claiming to be from your bank. They ask you to give out your confidential information such as your bank account PIN in order to solve a problem. Do not give out your information! Your bank will NEVER confirm your details over a phone call. Here’s how to avoid becoming a victim of social engineering: - Never give out your private information such as your password,

Protect your Heart and Bank Account from Catfishing!

Image
With the increase in social interactions being done online, there has been an increase in relationships that are being built over social media networks as well as apps such as Tinder, etc. Did you know that a recent study showed that 1 in 5 relationships began online? If things continue like this then by the year 2040, almost 70% of people in the world will meet their significant other online via a social media network or an app! Because everything is online these days, scammers have taken advantage of this opportunity to con those who are looking for love online. Catfishing is an online scam where someone creates a fake online identity for the purpose of starting a fake relationship and usually scamming people out of their money over a period of time. Are you dating online or thinking about dating online? The person is too good to be true – They are extremely rich, attractive and glamourous. The relationship is moving unnaturally fast – They profess their und

4 Ways to Protect your Smartphone from Spyware!

Image
Your cell phone is an important part of your everyday life. I mean, we basically need our phones for just about everything from work and play to storing personal info and data. This is why smartphones have become one of the main targets for spyware! How can spyware harm you? Once spyware is installed on your phone, it will track all your movements as well as your internet use so it can target you with the appropriate advertisements. It is frightening to think that this could happen to you, but luckily this spyware rarely affects you or your information too seriously. However, there are other, more dangerous types of spyware that you should worry about! These programs are created to gather your personal information to use for identity theft or even spy on you directly by gaining access to your smartphone camera or microphone. Because we use our mobile phones for just about everything these days, spyware is and will still become more widespread in the future. Here’s how

What is Spyware?

Image
Spyware is software that infiltrates your mobile phone or computer, stealing your data and private information. Spyware is classified as malicious software that is created to damage your device, often without you even realizing it is happening. A lot of spyware can even install foreign software that allows hackers to change your settings and passwords, that is why it is so important to always keep your device updated on a regular basis. Spyware is one of the most common threats that can gain access to your computer or cell phone, it can be a massive threat to your business as well as yourself as an individual since it can steal private, personal data and cause harm to your network. Here are the four main types of spyware that you need to lookout for… Adware. This spyware will track your browser history and your downloads in order to display ads about services and products you are interested in. Adware can be annoying plus it can really slow down your devices.

Online Fraud – What is Reputational Hijacking?

Image
Online scams take on new forms every day. The latest in a string of scams include reputational hijacking. We spoke to Cape Town Attorney, Farouk Mowzer, about some of these online scams sites. According to Farouk Mowzer, online fraud is indeed a big thing. It's relatively easy to set up a fake website that purports to be well-meaning and providing independent reviews, but what if that review is intentionally false? According to industry specialists, a number of websites have popped up in the past year that offer independent reviews and listings of scammers. These sites, however, are totally devoid of actual facts, trawl the internet for unrelated information and pop up the data as "reports". Conveniently, these sites have no real contact details that will lead you to be able to take the content offline. Type in the website name and remove though and you quickly find a paid for service at $1000 that guarantees removal, effectively, online blackmail. The sit

Watch out for these 5 Common Social Media Scams

Image
As humans, we’re basically wired to social media networks such as Facebook, Twitter, and Instagram. And because of our obsession scammers are taking advantage and more and more people are falling for social media scams. Here are the 5 most common social media scams to look out for. 1. Chain Letters. You’ve probably seen this one before. For example, retweet or like this and we’ll donate a million dollars to charity! The truth is both the post and the claim are obviously fake. Either a post like this is done by someone looking for a laugh or simply sharing it from someone else; otherwise, it could be a scammer trying to trick you into clicking a dangerous link. 2. Cash Grabbing. We use social media to stay in touch with friends, right? But how well do you really know half the people on your friend's list? Always think twice if you get a request from someone claiming they need cash for an emergency. Rather call your friend first to double check if it’s really them o

Smishing Scams – Serious Fraud with a Silly Name!

Image
Smishing attacks aim to gain access to your private information by using SMSs to target victims. Smishing is becoming an emerging threat that continues to grow over the years. Why? Because mobile banking is becoming more and more commonly used these days. Here’s how smishing attacks work: - You will receive an SMS that seems legitimately from a popular bank or organisation asking you to contact them on a number or click on a link. - Once you contact them or click the link you will be asked to give out your personal information such as your account number, password or PIN. - The scammers now have access to your accounts, etc. and can do with them what they wish. In this day and age, people use their smartphones for basically everything, including online banking. There is a lot of private information at risk if your phone is exposed to a scammer. Here’s how to identify a smishing scam: - You are SMSed and asked to confirm your private details such as

What is an Online Shopping Scam?

Image
An online shopping scam will usually include a scammer using a fake website or fake social media account/ store to trick you into buying something from them. The scam will usually also involve using fake adverts to try and lure victims in. A scammer will try and use unbelievable deals and services such as shipping overnight and free delivery to trick victims into not thinking twice and just acting on instinct. The goods that the scammer is offering are usually fake or you just never receive them. They will often ask you not to pay by card, but to use an EFT payment, gift card or cryptocurrency. Not only that, but a scammer will try and trick you into giving out your personal information, such as your bank information, by asking you to fill in a form to finish the order or to sign-up. Online shopping scams continue to increase every year, here’s how to spot and online shopping scam: - You receive an email from an online store, but you cannot find any info about