Collaborative Information Site

Online Security

Security and risk complaints online: Police launch bid to tackle dating fraud

Scotland Yard have teamed up with charities and other forces across the capital amid a spike in fraud linked to dating websites and apps.


According to City of London Police one victim reports scams linked to romantic liaisons every three hours.


Scam victims lose an average of £10,000 in the UK with almost all fraudsters demanding their targets transfer money within the first month of contact.



The two police forces, alongside charities Age UK and Victim Support have urged those looking to romance to follow dating tips in order to avoid financial misery.



Read more

continue reading
1 visits |0 Comments|Reply

Online Fraud Detection on Western Union settlement highlights risk of wire transfer scams


The median loss on frauds involving money transfers was $600 last year, twice as much as 2015, according to


Around 39,000 Texans will receive restitution for wire fraud scams involving Western Union in a $586 million settlement announced by the U.S. Department of Justice last month.


The settlement is on top of a $5 million settlement reached last week with Texas and 48 other states over the same issue — complaints by people who used Western Union’s wire transfer service to send money to third parties who were involved in schemes to defraud them.


In both cases, Western Union, the largest money service business in the world, has agreed to implement an anti-fraud program that includes mandatory training of its agents on fraud-induced wire transfers, heightened anti-fraud procedures and other measures to prevent scams through its wire service.


Read More


continue reading
1 visits |0 Comments|Reply

Online Security - What is Pharming and how can you Prevent this Online Fraud?

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.


What is Pharming


Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.


The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or

continue reading
1 visits |0 Comments|Reply

Cyber security: Cyber crime: an unprecedented threat to society?

In the last year cyber crime has been firmly established as one of the biggest threats to democracy, privacy, and health and safety. Here, Simon Townsend chief technologist EMEA at Ivanti Software discusses this threat and the possible ways to circumnavigate it


What cyber security trends from 2016 did you see?


Ransomware, ransomware, ransomware! Not only this, but 2016 was also year of insider threats. Email continued to be the main route of entry, with phishing scams running rife in organisations.



Ransomware got its own stage in 2016: in 2015 many people were mixing the attack up with other methods of entry or it wasn’t on the agenda for many decision makers. However, now it’s not something just for certain high-profile organisations, it’s a problem for everybody.


Read more

continue reading
2 visits |0 Comments|Reply

Cyber Security - How To Spot Malicious Emails From Hackers

Malicious emails are one way that hackers try to get access to your private information. If you receive a spam email, you should delete it immediately — do not open any attachments or click any links. It only takes one wrong click, and hackers can gain access to your entire computer.

Spammers are getting smarter when crafting malicious emails. But many messages are still riddled with grammar and spelling mistakes. Read the subject line and first few sentences of the email to determine if the email uses broken language or text not related to the purpose of the email. Here is an example of misspellings in a real malicious email: “Confirm your e-mail by filling out your Login Information below or your account will be suspended within 24 hours for security reasons.” Other examples of messages with broken language include “Verify your account now to avoid it closed!!!” and “Warning!!! Account owner that refuses to update his or 

continue reading
4 visits |0 Comments|Reply

Online Security The Email Edge: The New Cyber Crime

An email pops up in your inbox, saying you have a date in court. And it uses your first name. Pretty alarming, no? Not to worry — courts don’t communicate that way. It’s a scam — a variant of one that apparently has spread from Australia and the UK. But the purpose isn’t to bilk you out of money — it’s to steal your identity and get you to click on malicious links.


Welcome to the new spam, a phenomenon that threatens consumers and companies alike. Such schemes have long existed, but they are now more insidious, thanks to improved technology and the boundless creativity of the perpetrators.  


For example, the Internal Revenue Service warned this week that thousands of taxpayers’ W-2 records have been compromised. 


“This particular scam, sometimes referred to as business email spoofing (BES), reportedly first appeared last year, said the IRS,” reports. “Cybercriminals send emails to employees in payroll and human resources (HR) using slightly modified email addres

continue reading
2 visits |0 Comments|Reply

Online Security: How to protect yourself as fraudsters target dating sites to steal money and IDs

The internet love cheats after your cash: How to protect yourself as fraudsters target dating sites to steal money and IDs

Love hurts, so the song goes, but it can also wreck your finances if the object of your affection proves to be a fake.

Organised gangs of scammers, using both humans and robots, are ruthlessly targeting people through online dating services to steal money and identities.

As the number of victims rises, follow our guide to fend off internet love cheats.


Romantics are preparing for Valentine’s Day on Tuesday but Cupid’s arrow has a costly outcome for an increasing number of single people searching for a soulmate.

The booming £12billion online dating market is proving rich fodder for fraudsters who regularly trawl websites to hoodwink thousands of victims out of millions of pounds every year.

A dating fraud campaign launched today aims to stamp out these ‘romance scams’ – where dates turn out to be nothing more than fraudsters who destroy people’s lives both

continue reading
3 visits |0 Comments|Reply

Online Security - Keep your Online Identity Safe

No one is safe online. Everyone is vulnerable and it is your responsibility to establish precautionary measures to protect yourself against cyberattacks. Make yourself well informed and updated on different schemes which cybercriminals used to deceive online users.


The simple tips below should help ensure your security online without ruining the convenience online access offers:


1. Your passwords should be strong enough that it cannot be easily guessed by hackers. Do not use obvious passwords using your personal information or do not use the most common passwords that are ridiculously easy to guess. Moreover, make sure that you use different passwords for your online accounts because having similar passwords on all accounts makes it easier for hackers to steal your identity. 


2. Updating your software is very important. There are many good reasons why you need to update your software, thus make sure to take time updating and installing new versions of it.


3. Phishers do

continue reading
2 visits |0 Comments|Reply

Online Fraud Detection: Implement Basic Hacking Protection for your Website

When it comes to Content Management System (CMS), WordPress is the leading and the most popular among bloggers, businessman and even to developers. There are almost million users of WordPress and hundreds of thousands get hacked every year. Why? Because it is so popular that almost every hacker wants to get their hands on it to obtain any vital information.

There are things you can do to protect your website from these hackers. Here are some easiest ways to protect your website:

1. Never use “admin” as your username to login to your account. “admin” is the most common username and password that makes a hacker’s job much easier. Moreover, make it a requirement to create a strong unique password and regularly change it to keep your site even more secure.

2. Set the right file permission on file uploads. Remember, user inputs are not your friend. If you disregard this, hackers can put malicious codes on files and once uploaded can affect your server in many different ways. 

continue reading
2 visits |0 Comments|Reply

Cyber Security Tips on how to stay safe online in 2017

Next year is another year of challenge for security experts to provide the best protection to the consumers. We are living in an age where new ways of stealing consumers’ personal and financial data online were always made each day by cybercriminals.


We are aware of this predicament, so we would like to offer some help even if it’s through our posts. We prepared the following tips to help you stay safe online and to ready yourself for the next year filled with internet security challenges.


Always install updates on your software



This should be applied in each of your electronic devices, not just in your desktop or laptop but also in your mobile devices and television as well. It is very important for the general public to understand how crucial updating software is. Software companies are creating new ways to stop cybercriminals’ new ways of stealing your private information, and they promptly release fixes for those vulnerabilities through their updates.


Read More

continue reading
4 visits |0 Comments|Reply