Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fraud

Beware of Fake iPhone 15 Upgrade Emails

With the new iPhone 15 release, scammers are taking advantage by impersonating mobile carriers or Apple support, claiming their target is eligible for a free or discounted iPhone upgrade. The scammer’s goal is to get their target to provide personal and financial information which is then used to attempt identity theft or make unauthorized charges. Read on to learn what signs to look out for and what to do if you fall victim to this iPhone 15 scam.

[HEADS UP] Aurora Police Department Warns of Contactless Payment Processors Scams

If you didn't trust contactless payment processors before, you really won't after hearing about this recent scam. The Aurora Police Department Economic Crimes Unit posted this tweet last week with a warning: Source: Twitter In a statement by Aurora Police Sergeant's Dan Courtenay on how cybercriminals obtain the user data to FOX31, “Now they have Bluetooth, where they can just sit in the parking lot of the gas station and it feeds right onto their laptop,” Courtenay said.

How To Avoid Credit Card Fraud Online

You can avoid credit card fraud online by securing your online accounts, avoiding saving your payment information on websites, being cautious of phishing scams, keeping a look out for credit card skimmers and more. Continue reading to learn more about how you can avoid credit card fraud online and how to report it if you’re a victim.

INETCO is Making Waves in the BC Tech Sector - INETCO is Named a Finalist for the Gamechanger Ambition Award

Each year, the BC Tech Association celebrates the remarkable achievements of the British Columbia technology community through the Technology Impact Awards (TIA). The Gamechanger – Ambition Award, is a testament to a company’s drive to address significant challenges, lead with conviction, and leverage technology to shape a better future.

Deepfakes: The Threat to Reality and How To Defend Against It

Deepfakes have emerged as a serious concern in the digital landscape, presenting a significant threat to truth and trust. While it can be fun to swap your face with the Mona Lisa, there are some significant concerns around how these can be used to deceive us. Let’s take a look at some of the methods used, and ways to spot red flags.

Cybercriminals Use Google Looker Studio to Host Crypto Scam to Steal Money and Credentials

Security researchers at Check Point have discovered yet another attack that leverages legitimate web applications to host attacks in order to bypass security scanners. One of the easiest ways for a security solution to spot a phishing attack is to evaluate the webpage a malicious link takes the recipient to.