Skip to main content

Posts

What is Phishing? Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. What is Spear Phishing? Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. This is achieved by acquiring personal details on the victim such as their friends, hometown, employer, locations they frequent, and what they have recently bought online. The attackers then disguise themselves as a trustworthy friend or entity to acquire sensitive information, typically through email or other online messaging. The main difference betwen  Phishing  and  Spear Phishing , i
Recent posts
What is antivirus software? Antivirus is software purpose-built to detect and destroy threats like viruses, malware, ransomware, spyware and others. It helps protect your computer against malware and cyber criminals. Antivirus software looks at data — web pages, files, software, applications — traveling over the network to your devices. It searches for known threats and monitors the behavior of all programs, flagging suspicious behavior. It seeks to block or remove malware as quickly as possible. What is antivirus software designed to do? Antivirus software is a program or umbrella of programs whose purpose is to scan for and eradicate computer viruses and other malicious software, also known as malware. Antivirus software is a vital component of your overall online and computer security strategy in its protection against data and security breaches along with other threats. A computer virus is similar to a cold virus. It’s designed to go from one computer or device to the next, copying
How does Cyber Criminals Spear Phish you? Cyber Criminals will scan thru internet and target business that  Multiple presence globally Have overseas customers Have overseas suppliers Doing regular bank transfer payment From your website, study your nature of your business Thru social engineering, ask for the finance/accounts key person's email address  Thru social media like Facebook, LinkedIn, study how to target the key person.  From the domain information, the cyber criminal can know whether the user is a Google, Office 365 or Domain Registrar POP/IMAP Mail Hosting   Obtain the key person email password by directing you to go to the fake website to authenticate identity and password. After obtaining the mail login credentials, login to webmail and setup 3 forwarding email rules to monitor your activities silently (See Below) Email that has certain keywords in the subject or body like "late payment", "wire transfer", "due payment"
Have I Been Pawned?   Check whether your email address that has been compromised in a data breach AbuseIPDB : Provides reputation data about the IP address or hostname BrightCloud URL/IP Lookup : Presents historical reputation data about the website Desenmascara.me : Flags websites suspected of selling counterfeit products FortiGuard lookup : Displays the URL’s history and category Google Safe Browsing : Look up the website’s current status hashdd : Provides historical data about IPs, URLs, etc. IBM X-Force Exchange : Provides historical data about IPs, URLs, etc. Joe Sandbox URL Analyzer : Examines the URL in real time Is It Hacked : Performs several checks in real time and consults some blacklists IsItPhishing : Assesses the specified URL in real-time Kaspersky Threat Intel Portal : Looks up the IP, URL, or domain in a blacklist Norton Safe Web : Presents historical reputation data about the website Palo Alto Networks URL Filtering : Looks up the URL in a blacklist Phis
The Internet allows businesses of all sizes and from any location to reach new and larger markets and provides opportunities to work more efficiently by using computer-based tools. Whether a company is thinking of adopting cloud computing or just using email and maintaining a website, cybersecurity should be a part of the plan. Theft of digital information has become the most commonly reported fraud, surpassing physical theft. Every business that uses the Internet is responsible for creating a culture of security that will enhance business and consumer confidence. SME Cyber Security Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need a cybersecurity strategy to protect their own business, their customers, and their data from growing cybersecurity threats. To know more CyberSecurity  https://www.winpro.com.sg/it-security/ IT Support, IT Company, IT Services Win-Pro S