Social Media use nowadays is commonplace, along with its popular use comes a great risk of identity theft and other abuse and fraud. Maintaining secure social networks is challenging due to the diversity of communities and the ability to create accounts and identities with minimal verification and authenitication. Currently social media platforms are still booming,...Continue Reading
Lately the popular cable and satellite TV network HBO has fallen victim to hacking, as a result a total of 1.5 TB of data were stolen which is quite alarming because this is the biggest data theft incident yet that happened ever since Sony leaks happened last 2014. The hackers claimed that the immense data...Continue Reading
Fake News impacts business Executives and organisation brand. We have entered a new era of “Fake News” which can have a direct impact on all business Executives and brand protection strategies. Fake News is real news – if you believe it. Fake News is being spread on dubious websites, specifically set up for this purpose....Continue Reading
Trademark and Copyright enforcement to protect digital assets. In an online world the digital assets of the business are open to a large range of fraud and abuse. Digital assets can be legally protected via Trademark and Copyright ownership claims. Examples of trademark and copyright infringement are fake websites and phishing sites, unauthorized social media...Continue Reading
gTLDs Phishing, Fraud, Abuse Observations – Top Level Domains (TLDs), such as .com, .org, .biz, .net, a part of the domain name that is installed in the root zone, now come in many different variations and flavours – such as generic TLDs (gTLDS), Country-Code TLDs (ccTLDS). These new TLDS have opened up the Domain Name...Continue Reading
Social Media presents a new set of challenges for the business and is a growing area of online brand abuse and fraud. Social Media provides a new mechanism for cybercrime affording the opportunity to distribute phishing and malware content. Social engineering is a key component of Advanced Persistent Threats — APT attacks and often infrastructure...Continue Reading
Electronic channels are a highly efficient mechanism of delivering online services, capabilities and transacting with the end user customer presenting many favorable outcomes for the organisation as well as the end user. However, the electronic channel is open to range of abuse and fraud, ranging from benign to malicious activity. The following is an outline...Continue Reading