A team of researchers from the Microsoft Threat Intelligence Center (MSTIC) has warned of an ongoing attacks by the GALLIUM cybercriminal group targeting telecommunication providers in Southeast Asia, Europe and Africa. Attackers exploit vulnerabilities in the WildFly open ... Read More
Tier3 monitoring teams have detected that Public Procurement Regulatory Authority (PPRA) official website ppra.org.pk was earlier this morning by a hacker group "The Crash Rulers" . It is the same group that supposedly hacked Pakistan ... Read More
US officials say their attacks on Iranian military computers disabled systems that control missile and rocket launchers. The United States military launched cyberattacks against Iranian missile control systems and a spy network on Thursday after ... Read More
Scanbox framework used to hack Pakistani Govt’s passport application tracking site http://tracking.dgip.gov.pk Experts uncovered a watering hole attack against the Pakistani Govt’s passport application tracking site, hackers used the Scanbox Framework to steal visitors’ data ... Read More
Hackers were able to use the vulnerability and install other malware on phones. After 2 Weeks WhatsApp confirms its 1.5 Billion users need an upgrade. WhatsApp the most popular messenger app, is also owned by ... Read More
Fileless malware attacks are increasing every day.They can nowadays be seen as the perfect crime of opportunity. The initial vector of these attack can be a seemingly innocuous business email with a link to an ... Read More
In a latest security alert email sent by PKNIC (registrar of all .PK domains ) to its customers, it is reported that there has been an increase in cyber attacks on Pakistani IT installations in ... Read More
Even if security experts continue to make awareness campaign, people continue to use bad passwords exposing their data to the risk of hack. Bad habits are hard to die, 123456 is the most used password ... Read More
1. Do not give any personal information (name, address, bank details, email or phone number) to organisations or people before verifying their credentials. Always question unsolicited calls, texts or emails requesting your personal or financial ... Read More
Payment/ bank card fraud involves the compromise of any personal information from credit, debit or store cards. The personal information stolen from a card, or the theft of a card itself, can be used to ... Read More
The study, Security, Fraudulent Transactions and Customer Loyalty: A Field Study was put together by a team led by Professor Rahul Telang and analysed data from 500,000 anonymised financial services users over five years. The researchers observed actual user behaviour rather than quizzing them about their intentions.
with a little help from the UK government and the UN Office of Drugs and Crime, an automated system will track millions of transactions and be able to flag suspicious ones instead of the authorities having to wait for banks.
Our experts confirm spoofing contact details is easy to do. There are a number of websites who offer the service as a way to "prank" your friends.Not saying these sites are set up for criminals but are they taking into account that fraudsters are making use of the spoofing services.