Categories
IT Security Outsourced IT

SIM-Swapping Attack

What is a SIM-Swapping Attack? SIM swapping, sometimes called SIM hijacking, occurs when a device tied to a customer’s phone number is fraudulently manipulated. Cyberattackers usually employ SIM swapping as a way to receive one-time security codes from banks, cryptocurrency exchanges, and other financial institutions. A study by Princeton University found that four-fifths of SIM-swap […]

Categories
IT Security

Emotet

What is Emotet? Emotet is a computer malware program that was originally developed in 2014 as a banking Trojan. The goal of the malware was to access foreign devices and spy on sensitive private data. Once a device is infected, the malware spreads like a computer worm and attempts to infiltrate other computers on the […]

Categories
IT Security

Skimming & Digital Skimming

What is Skimming and Digital Skimming? Skimming. A skimming attack refers to an attack where a third-party gains unauthorized access to your financial information through an ATM, fuel pump, or POS terminal. Skimming devices typically record the personal identification number (PIN) of the cardholder and store it on an attached microchip or magnetically on a […]

Categories
IT Security Outsourced IT

Web Skimming

What is Web Skimming? The term “skimming” has generally referred to the illicit financial accounting procedure of returning lower invoice totals than were actually collected, allowing criminals to “skim” money off the top of the invoice. Web skimming refers to a hacking technique that targets digital businesses by manipulating client-side web applications to steal their […]