Category: Fraud and ID Theft

New Facebook Scam Preys on Curiosity about Missing Malaysian Airlines Flight

March 19th, 2014

Facebook page with fake video

Cyber criminals continuously take advantage of current events in order to trick people into clicking malicious links or sharing personal information. For example, last month we wrote about how mobile malware was being spread through Valentine’s Day apps.
Read the rest of this entry »

“Obamacare” Affordable Care Act Offers Opportunity for Identity Theft, Phishing

September 30th, 2013

The Affordable Care Act (“ACA”), often referred to as Obamacare, is ostensibly designed to make it easier for people to obtain affordable health insurance coverage and healthcare. Some provisions of the law are already in place, some will be soon, and one will take effect tomorrow. On October 1, 2013 open enrollment starts, enabling people to enroll in a Qualified Health Plan.

As security experts point out, ACA isn’t just any big tech project, and it is exceptional for the U.S. government. Along with expected technical glitches, criminals will no doubt find myriads of ways to take advantage of people when open enrollment starts, including phishing, identity theft and others. In fact, they already are.
Read the rest of this entry »

“Like” My Company, Win a Prize??

October 1st, 2012

Five Tips to Spot Promotional Scams and How to Ensure Your Promotion is Legal

Sweepstakes and promotional scams are a common method of defrauding people. “If it seems too good to be true… it generally is.” You receive an email asking you to sign up or telling you you’ve already won. The prize? Malware.

This phenomenon affects companies and individuals alike. Such social engineering scams are widely used by cyber criminals. With the goals of these scams being anything from quiet theft of information, outright system shut down, or garnering money companies must be aware of the threat posed to their infrastructure.
Read the rest of this entry »

Common Questions About the New gTLDs

February 22nd, 2012

A generic Top Level Domain, or gTLD, is the name that appears to the right of “dot,” such as .com. The Internet Corporation for Assigned Names and Numbers (ICANN) has begun taking applications for new gTLD’s. With the deadline to apply for a gTLD fast approaching on April 12, 2012, many companies are wondering whether they should apply. In light of the many factors that a company must consider before applying, Cyveillance is unable to make a global recommendation to all of our clients. However, the basics about the new gTLDs, the benefits, and the drawbacks are discussed below:

How many gTLD requests is ICANN expecting in this first round of applications?
ICANN is expecting between 200 and 1,000 applications. Some experts are predicting that, based upon the number of applications it receives, ICANN may not hold another application round for several years after this initial offering.

What if someone else applies for the same gTLD that I apply for?
ICANN is encouraging resolution between the parties. If the parties cannot come to an agreement, the last resort will be an auction. See Section gTLD Applicant Guidebook.

Read the rest of this entry »

Anti-Counterfeiting Trade Agreement (ACTA) Explained

November 14th, 2011

The proliferation of counterfeit and pirated goods poses considerable challenges for legitimate trade and the sustainable development of the world economy. Trade in these counterfeit and pirated goods causes significant financial losses for right holders and legitimate businesses. It also hinders sustainable economic development in both developed and developing countries and, in some cases, represents a health or safety risk to consumers.

As a result, in October 2007, the United States, the European Community, Switzerland and Japan simultaneously announced that they would negotiate a new intellectual property enforcement treaty, the Anti-Counterfeiting Trade Agreement, or ACTA. ACTA represents a significant achievement in the fight against the infringement of intellectual property rights, particularly against the proliferation of counterfeiting and piracy on a global scale, and provides a mechanism for the parties to work together in a more collaborative manner to achieve the common goal of effective Intellectual Property Rights (IPR) enforcement. When it enters into force with all participants, ACTA will formalize the legal foundation for a first-of-its-kind alliance of trading partners, representing more than half of world trade.

Read the rest of this entry »

Update – How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

October 19th, 2011

The information below is an update to the following blog posting: How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

Trademark owners outside of the adult industry may sign up with ICM Registry to block trademarks from showing up on its new .XXX gTLD. Trademark owners have been making several common errors when applying for a .XXX gTLD.[1] If your company plans on submitting an application before the Sunrise B October 28, 2011 deadline, keeping these mistakes in mind can help you avoid paying multiple fees and having to reapply.[2]
Read the rest of this entry »

How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

September 9th, 2011

Internet Corporation for Assigned Names and Numbers (ICANN) has instituted a new generic top-level domain (gTLD) program that will create a means for prospective registry operators to apply for new gTLDs, and create new options for consumers in the market. Every domain name around the world ends with a top-level domain (TLD); these are the two or more letters that come after the dot following a web address. Read the rest of this entry »

Landmark Legal Case: If Your Members Have Been Phished, Your Credit Union May Have To Pay

August 24th, 2011

Excellent overview of recent landmark phishing case along with joint NAFCU-Cyveillance podcast:

RSA Token Vulnerability and One of America’s Most Secret Agencies Invoked in Latest Spear Phishing Attack

July 22nd, 2011

A targeted scam or “Spear Phishing” attack making the rounds today invokes the National Security Agency and takes advantage of recent news about a hack of RSA’s two-factor security tokens. Cyveillance has now captured examples and reports of several variants of this email, most sent under the subject lines “Token Code Update” or “Security Token Update”. Read the rest of this entry »

A Five-Point Plan for Social Network Usage

June 14th, 2011

If there’s any message you should take away about utilizing social media in a secure manner, it can be summarized in one word: education. Read the rest of this entry »