Even though users are reporting that the app is fake in the reviews on Google Play Store, it is still available for download and getting positive ratings. Malicious Android app found powering account creation service (bleepingcomputer.com) The actions of the app to hijack account creation processes for major services such …
Google action to protect small businesses
Google is recognising the impact its services have on the success of smaller businesses, and how scammers are taking advantage to exploit those same businesses. The article covers the legal actions Google has taken; the scams that are being run in its name and advice on how to deal with …
Continue reading “Google action to protect small businesses”
How gift cards enable monetise cyber-attacks
I published an article yesterday on CyberAwake looking at how gift cards are misused by threat actors: How Gift Cards are exploited by Cyber Criminals – CyberAwake
Threat actors are always on the lookout for ways to get to you
So a new trend going viral on a social media platform is an ideal place to interfere with and use to spread malware. Just like the “Invisible Body” challenge on TikTok: TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com) Do not be deceived by the offer from the hackers …
Continue reading “Threat actors are always on the lookout for ways to get to you”
Stress – the classic social engineering tactic
Threat actors have to find ways of breaking down our cyber security training – that is where social engineering comes in. They want to find some way to get you to do what they want – this usually means exploiting your trust, but a bt of stress in there to …
Continue reading “Stress – the classic social engineering tactic”
