browser warning

Local website hacked for phishing expedition

A webserver hosted on the Telkom network, has been breached and used to host a phishing site.  Urlscan lists the site as naphotography.co.za with three levels of file systems as shown below. Cyber criminals do this to hide phishing sites. Naphotography.co.za / 83de / journal / citi Urlscan.io has confirmed that the domain had been comprised and used for phishing. Harvesting information from victims is used by cyber criminals to
Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas.  This process has opened the portal to unknowing consumers that are downloading everything from ransomware
5 Major Short List Topics to Help Deter Your Security Risk

5 Major Short List Topics to Help Deter Your Security Risk

Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk of security problems.  The entire topic may seem overwhelming to some, but every company is
gmail-virus-davinciforensics

Protecting Against Gmail Virus Attack

Google and their email service, Gmail, have become the gold standard services for both individual and some company accounts. As a global corporation, Google has maintain levels of excellence that have not been surpassed by many and the additional features such as Google Map has made them the most popular in most of South Africa. However, with the advent of such a giant, there will be perpetrators that take advantage
Protection Against Phishing

Protection Against Phishing

Protection Against Phishing Internet Providers or ISP’s are considered to be the first line of defense against phishing attacks and the cyber criminals seem to be playing a ‘cat and mouse’ game to continually try to stay ahead of them. Those that specialize in ‘phishing’ have made a profession by emulating websites that are often trusted sources and by doing so, invite the user to send them personal information. ISP’s