Sep 30

“Obamacare” Affordable Care Act Offers Opportunity for Identity Theft, Phishing

General Cyber Intel Phishing Fraud and ID Theft Social Media Rogue Mobile Application

The Affordable Care Act (“ACA”), often referred to as Obamacare, is ostensibly designed to make it easier for people to obtain affordable health insurance coverage and healthcare. Some provisions of the law are already in place, some will be soon, and one will take effect tomorrow. On October 1, 2013 open enrollment starts, enabling people to enroll in a Qualified Health Plan.

As security experts point out, ACA isn’t just any big tech project, and it is exceptional for the U.S. government. Along with expected technical glitches, criminals will no doubt find myriads of ways to take advantage of people when open enrollment starts, including phishing, identity theft and others. In fact, they already are.
Read more

Oct 1

“Like” My Company, Win a Prize??

General Cyber Intel Malware Legal Fraud and ID Theft

Five Tips to Spot Promotional Scams and How to Ensure Your Promotion is Legal

Sweepstakes and promotional scams are a common method of defrauding people. “If it seems too good to be true… it generally is.” You receive an email asking you to sign up or telling you you’ve already won. The prize? Malware.

This phenomenon affects companies and individuals alike. Such social engineering scams are widely used by cyber criminals. With the goals of these scams being anything from quiet theft of information, outright system shut down, or garnering money companies must be aware of the threat posed to their infrastructure.
Read more

Feb 22

Common Questions About the New gTLDs

General Cyber Intel Legal Domain Names and ICANN Fraud and ID Theft Brand Protection

A generic Top Level Domain, or gTLD, is the name that appears to the right of “dot,” such as .com. The Internet Corporation for Assigned Names and Numbers (ICANN) has begun taking applications for new gTLD’s. With the deadline to apply for a gTLD fast approaching on April 12, 2012, many companies are wondering whether they should apply. In light of the many factors that a company must consider before applying, Cyveillance is unable to make a global recommendation to all of our clients. However, the basics about the new gTLDs, the benefits, and the drawbacks are discussed below:

How many gTLD requests is ICANN expecting in this first round of applications?
ICANN is expecting between 200 and 1,000 applications. Some experts are predicting that, based upon the number of applications it receives, ICANN may not hold another application round for several years after this initial offering.

What if someone else applies for the same gTLD that I apply for?
ICANN is encouraging resolution between the parties. If the parties cannot come to an agreement, the last resort will be an auction. See Section gTLD Applicant Guidebook.

Read more

Nov 14

Anti-Counterfeiting Trade Agreement (ACTA) Explained

Legal Fraud and ID Theft Information Protection Online Pharmacy

The proliferation of counterfeit and pirated goods poses considerable challenges for legitimate trade and the sustainable development of the world economy. Trade in these counterfeit and pirated goods causes significant financial losses for right holders and legitimate businesses. It also hinders sustainable economic development in both developed and developing countries and, in some cases, represents a health or safety risk to consumers.

As a result, in October 2007, the United States, the European Community, Switzerland and Japan simultaneously announced that they would negotiate a new intellectual property enforcement treaty, the Anti-Counterfeiting Trade Agreement, or ACTA. ACTA represents a significant achievement in the fight against the infringement of intellectual property rights, particularly against the proliferation of counterfeiting and piracy on a global scale, and provides a mechanism for the parties to work together in a more collaborative manner to achieve the common goal of effective Intellectual Property Rights (IPR) enforcement. When it enters into force with all participants, ACTA will formalize the legal foundation for a first-of-its-kind alliance of trading partners, representing more than half of world trade.

Read more

Oct 19

Update – How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

General Cyber Intel Phishing Legal Domain Names and ICANN Fraud and ID Theft Brand Protection

The information below is an update to the following blog posting: How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

Trademark owners outside of the adult industry may sign up with ICM Registry to block trademarks from showing up on its new .XXX gTLD. Trademark owners have been making several common errors when applying for a .XXX gTLD.[1] If your company plans on submitting an application before the Sunrise B October 28, 2011 deadline, keeping these mistakes in mind can help you avoid paying multiple fees and having to reapply.[2]
Read more

Sep 9

How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

Phishing Domain Names and ICANN Fraud and ID Theft Brand Protection

Internet Corporation for Assigned Names and Numbers (ICANN) has instituted a new generic top-level domain (gTLD) program that will create a means for prospective registry operators to apply for new gTLDs, and create new options for consumers in the market. Every domain name around the world ends with a top-level domain (TLD); these are the two or more letters that come after the dot following a web address. Read more

Jul 22

RSA Token Vulnerability and One of America’s Most Secret Agencies Invoked in Latest Spear Phishing Attack

General Cyber Intel Phishing Malware Fraud and ID Theft Information Protection

A targeted scam or “Spear Phishing” attack making the rounds today invokes the National Security Agency and takes advantage of recent news about a hack of RSA’s two-factor security tokens. Cyveillance has now captured examples and reports of several variants of this email, most sent under the subject lines “Token Code Update” or “Security Token Update”. Read more

Subscribe to Our Blog!

Join thousands of security professionals and get our latest blog content in your inbox.

Your information will never be shared.