Remove Compromise Remove Credential Remove Phishing
article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. For instance, an attacker might send an email that appears to be from a trusted video communication platform, prompting you to click on a link to verify your account or update credentials.

Risk 242
article thumbnail

Understanding POS Security: Protecting Your Business and Customer Data

VISTA InfoSec

When used, these devices will collect payment details without the merchant’s knowledge, compromising customer data security. Many cyberattacks specifically target people through phishing and other kinds of social engineering. Solving this issue means empowering your employees to understand the nature of today’s cyber threats.

PCI DSS 245
article thumbnail

Deep Dive: Fraudsters Go Phishing

PYMNTS

Growing attack-related expenses force businesses to remain vigilant against emerging threats, including phishing and other types of fraud that their own employees may willingly or unwillingly perpetuate. The scheme originated from a number of phishing emails that targeted a handful of employees. Fighting the Phishers.

article thumbnail

Singapore, Hong Kong Police, INTERPOL Bust Scam Syndicate After S$17.9M in Losses

Fintech News

These scams involved pop-up alerts on victims’ devices, falsely claiming they were compromised by malware. Between January and July 2024, the SPF received 185 reports of technical support scams, resulting in losses exceeding S$ 17.9 The criminal proceeds generated by this tech-support scam were laundered through Hong Kong.

Scams 86
article thumbnail

Anomali Identifies Scam To Steal Gov’t Procurement Site Credentials

PYMNTS

An unidentified group is reportedly putting much effort into a complicated scam to steal the login credentials of government personnel. The victim is then offered a choice of logging in through email credentials from providers such as Google, Microsoft and Yahoo. Spoofed phishing site domains are hosted in Turkey and Romania.

article thumbnail

Why The Data Breach Decline Is Bad News For Businesses

PYMNTS

40 legitimate email accounts of company executives have been compromised in a phishing campaign targeting businesses , according to Gov Info Security reports. The scam involves sending a phishing email claiming to be a Microsoft Office 365 update.

article thumbnail

Singapore Authorities Issue Warning on Akira Ransomware Threat

Fintech News

Akira affiliates gain initial access by exploiting vulnerabilities, brute-forcing services like Remote Desktop Protocol (RDP), social engineering, and using compromised credentials. Regular training sessions should be conducted to make employees aware of phishing and other social engineering tactics used by cybercriminals.