5 ways AI is being used by scammers

5 ways AI is being used by scammers

Artificial Intelligence (AI) has many benefits. It can help us do our work – especially boring, repetitive tasks – more quickly and efficiently. But, it also helps scammers do their work better too. Here are five ways that hackers are using AI. 1....
A new WhatsApp scam enables account hijacking

A new WhatsApp scam enables account hijacking

A new WhatsApp OTP (one-time password) hack has just been identified in India which enables scammers to takeover users’ accounts via a phone call. Whilst scams targeting WhatsApp are nothing new, this one takes advantage of external call forwarding services.  How does...
Why “liveness tests” can be vulnerable to attack

Why “liveness tests” can be vulnerable to attack

To prevent fraud, companies are looking at increasingly sophisticated methods to verify customers’ identities. “Liveness tests” are one way of doing this, but it seems that even these are vulnerable to attack.  What are “liveness tests”? “Liveness tests” are used by...
5 ransomware trends to look out for 

5 ransomware trends to look out for 

Ransomware attacks are on the rise. According to a report by AV-TEST, the amount of malware has reached a new high, with over 150m harmful programme variants identified. And the risk of stolen data being released due to ransomware attacks increased from 8.7 percent in...
The growing trend of current event-based phishing hacks

The growing trend of current event-based phishing hacks

You might think you can spot a phishing email a mile off. But gone are the days of “Nigerian princes” asking you to wire them money. Hackers have become more sophisticated in their techniques. Their new tactics are clearly working as, according to CISCO’s 2021...
What’s warshipping and why should you be aware of it?

What’s warshipping and why should you be aware of it?

You might not consider warshipping – malicious hardware sent by post – when planning your cybersecurity strategy. After all, it uses one of the oldest methods of delivery available. Yet, it can pose a real threat to your network if successful.  Warshipping...