AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

Protecting your brand from deepfakes in the metaverse

The metaverse might still seem futuristic for many companies, but it’s likely to become an important way of connecting with people and customers in future. Some companies are already conducting business in the metaverse.  Whilst you might not be ready to join them,...

Why cybersecurity teams need oversight of social media accounts 

These days, if your business doesn’t have a presence on social media - whether that’s Twitter, Facebook or LinkedIn - you’re missing a trick. It’s becoming a vital way to connect with customers. However, it also creates a vulnerability that you might not be...

“Europol ploy”: the latest phone scam in Europe

A new phone scam is on the rise in Germany and other parts of Europe in which scammers impersonate Europol officers to trick victims into transferring them money, vouchers or personal details. How does the scam work? First, you will receive a call with a recorded...

How AI can help turn the tables on scammers 

As cybercriminals become increasingly sophisticated with their scams, using artificial intelligence (AI) to scale up their operations, it can feel like fighting a losing battle. However, AI and machine learning (ML) can also be used against them. Here’s how: Detecting...

How to tell if you have ransomware

No business wants to become a victim of a ransomware attack. This is when data on your computer or network is held hostage until you pay a ransom. In most cases - particularly human-operated ransomware (as opposed to automated ransomware) - there will be warning signs...

Recent Bite-Size Posts

The growing trend of current event-based phishing hacks

You might think you can spot a phishing email a mile off. But gone are the days of “Nigerian princes” asking you to wire them money. Hackers have become more sophisticated in their techniques. Their new tactics are clearly working as, according to CISCO’s 2021...

What’s warshipping and why should you be aware of it?

You might not consider warshipping - malicious hardware sent by post - when planning your cybersecurity strategy. After all, it uses one of the oldest methods of delivery available. Yet, it can pose a real threat to your network if successful.  Warshipping is on the...

Mobile payment app scams: 5 ways to avoid them

Mobile payment apps have made sending money easier, but they have also created a new opportunity for scammers.  One phishing scam that US authorities warn about involves the app Zelle - owned by a consortium of major banks including Bank of America, Chase,...

4 cybercrime trends to be aware of in 2022

Whilst any cyber attack is unpredictable, there are trends that hackers follow. Here are some of the main ones to be aware of in 2022.  1. Current event-based phishing attacks Phishing is not a new tactic, however attacks are becoming increasingly sophisticated....

How to protect yourself against revenge attacks

Imagine an ex-employee, who was fired by your company, takes revenge by hacking into your IT system. They’re able to do this because passwords of systems they had access to have not been changed. Within a few hours they could potentially do significant damage to your...

5 ways to prevent tailgating in your company

You might not consider tailgating when developing your cybersecurity strategy, however it’s a form of social engineering which takes place in the physical world. It can be a tricky problem to tackle, but there are a few solutions.  What is tailgating? Tailgating is...

Should your business be using a VPN?

Virtual Private Networks (VPN) have been used by big international companies for years. But, as VPN services become more affordable and easy to use, businesses of all sizes can now use them to enhance online security.  What is a VPN? A VPN is an advanced...

How to protect yourself from evil twin attacks

Evil twin attacks usually occur when using public WiFi. With more people working remotely - perhaps at cafes or libraries - the chances of it happening increase. However, it’s not only public WiFi that can be duplicated, your company's guest network can too. This...

How can businesses tackle the spread of misinformation?

The effects of fake news aren’t limited to politics. Disinformation from rumours and coordinated campaigns can threaten companies' reputations and profitability, and even influence financial markets.  For example, conspiracy theories around the effects of 5G led...

The 2020 US election: How fake news was used to influence people

Fake news was, unsurprisingly, a concern during the 2020 US presidential elections. Fake news is 70% more likely to be shared than real news and in the run up to the 2016 election, it accounted for 6% of all news.  Fake news about voter fraud was widely spread...

3 types of disinformation scams to look out for

Disinformation is prevalent online - particularly on social media - and is often designed to manipulate you into giving away something valuable. Here are three recent examples of how scammers have used disinformation. 1. Charity-based scams As we touched upon in a...

How scammers exploit fake news on social media

Social media offers many opportunities for scammers to make money. And, they have few concerns about exploiting tragedy. For example, the current war in Ukraine has seen many con artists asking for ‘donations’. TikTok makes it easier to spread fake news Whilst scams...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report