Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas.  This process has opened the portal to unknowing consumers that are downloading everything from ransomware
gmail-virus-davinciforensics

Protecting Against Gmail Virus Attack

Google and their email service, Gmail, have become the gold standard services for both individual and some company accounts. As a global corporation, Google has maintain levels of excellence that have not been surpassed by many and the additional features such as Google Map has made them the most popular in most of South Africa. However, with the advent of such a giant, there will be perpetrators that take advantage

Cyberwar And False Facebook Profiles

The popularity of Facebook as a social media outlet has brought cybercrime into a whole new level. Individuals are freely sharing their personal information and often, naively, not paying attention to the security that is needed to protect this data, this now allows perpetrators to not only access their information, but to create false identities for both individuals and companies. South Africa has joined the many other countries that is
onlinedatingscam

Online Dating – Romance or Scam?

Online dating scammers are rife, particularly on social media where they prey upon and reach out to women who are lonely, they almost certainly know a percentage of women will take the bait and engage with them online. The scammers usually have a nice looking profile picture and send out a charming message that is very believable. "Audrey Elaine Elrod was divorced, depressed and broke when a romance-scammer targeted her
linkedinfakerecruiters

Fake recruiters take to Linkedin

Security analyst, Pierlugi Paganini explains that the “exploitation of social networks for intelligence gathering, especially professional social media like LinkedIn, is a common practice of threat actors.” The perpetrators gain users trust by having a seemingly credible recruitment profile, including a picture and links to other platforms such as Twitter or Facebook. Isight Partners suggests that these “credible persona’s, often those of attractive women, connect with their victims to gain