AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
The 2020 US election: How fake news was used to influence people
Fake news was, unsurprisingly, a concern during the 2020 US presidential elections. Fake news is 70% more likely to be shared than real news and in the run up to the 2016 election, it accounted for 6% of all news. Fake news about voter fraud was widely spread...
3 types of disinformation scams to look out for
Disinformation is prevalent online - particularly on social media - and is often designed to manipulate you into giving away something valuable. Here are three recent examples of how scammers have used disinformation. 1. Charity-based scams As we touched upon in a...
How scammers exploit fake news on social media
Social media offers many opportunities for scammers to make money. And, they have few concerns about exploiting tragedy. For example, the current war in Ukraine has seen many con artists asking for ‘donations’. TikTok makes it easier to spread fake news Whilst scams...
Do you know the difference between disinformation and misinformation?
The term ‘fake news’ is regularly used to refer to disinformation and misinformation, terms often used interchangeably. However, there is a subtle, but major, difference. What is disinformation? Disinformation is the intentional spreading of false information....
Why do you need more than password protection?
We all know that we have to use passwords to protect our accounts at home and work. But, on their own, how much protection do they offer? Many people reuse passwords or have multiple applications under one account (e.g., Google products). Not you, of course,...
Four common WhatsApp scams and how to avoid them
WhatsApp is one of the most popular apps with over 2 billion users globally. So it’s no surprise that it’s become a target for fraudsters. In 2021 alone, 59% of Brits reported receiving a message-based scam, 13% of which were via WhatsApp. Here are some common scams...
Don’t let remote working make you vulnerable
Business Email Compromise (BEC) is not new; however, fraudsters have changed their tactics in recent years. Rather than targeting C-suites and Executives, they’ve now cast their nets to the broader business ecosystem. And, the rise of home working has made their work...
Beware the deepfake con artists
Beware the deepfake con artists From the fun Tom Cruise impersonation, to the more concerning fake Nancy Pelosi video, “deepfakes” have gained a lot of attention. But what are they and why could they be harmful to your business? How are deepfakes made?...
HACKERS LOVE A BARGAIN
Why Hackers love bargin events and how to be protected? Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...
What is Whaling and how to avoid it?
* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here: (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...
Spear Phishing
Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...
IDN Homograph Attack aka UTF8 URL Impersonation
What is a IDN Homograph Attack? IDN (Internationalized Domain Name) Homograph Attack is a manipulative and simple, but sophisticated type of cyber attack. It is also called a "UTF8 URL Impersonation". How does it work? A hacker poses as a trusted counterpart...