Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fraud

[HEADS UP] Aurora Police Department Warns of Contactless Payment Processors Scams

If you didn't trust contactless payment processors before, you really won't after hearing about this recent scam. The Aurora Police Department Economic Crimes Unit posted this tweet last week with a warning: Source: Twitter In a statement by Aurora Police Sergeant's Dan Courtenay on how cybercriminals obtain the user data to FOX31, “Now they have Bluetooth, where they can just sit in the parking lot of the gas station and it feeds right onto their laptop,” Courtenay said.

How To Avoid Credit Card Fraud Online

You can avoid credit card fraud online by securing your online accounts, avoiding saving your payment information on websites, being cautious of phishing scams, keeping a look out for credit card skimmers and more. Continue reading to learn more about how you can avoid credit card fraud online and how to report it if you’re a victim.

INETCO is Making Waves in the BC Tech Sector - INETCO is Named a Finalist for the Gamechanger Ambition Award

Each year, the BC Tech Association celebrates the remarkable achievements of the British Columbia technology community through the Technology Impact Awards (TIA). The Gamechanger – Ambition Award, is a testament to a company’s drive to address significant challenges, lead with conviction, and leverage technology to shape a better future.

Deepfakes: The Threat to Reality and How To Defend Against It

Deepfakes have emerged as a serious concern in the digital landscape, presenting a significant threat to truth and trust. While it can be fun to swap your face with the Mona Lisa, there are some significant concerns around how these can be used to deceive us. Let’s take a look at some of the methods used, and ways to spot red flags.

Cybercriminals Use Google Looker Studio to Host Crypto Scam to Steal Money and Credentials

Security researchers at Check Point have discovered yet another attack that leverages legitimate web applications to host attacks in order to bypass security scanners. One of the easiest ways for a security solution to spot a phishing attack is to evaluate the webpage a malicious link takes the recipient to.

TikTok Impersonations of Elon Musk Scam Victims of Their Bitcoin

There’s been a surge of Elon Musk-themed cryptocurrency scams on TikTok, BleepingComputer reports. The scammers inform the victims that they can claim their reward after spending a small amount of bitcoin (about $132) to activate their account. “BleepingComputer tested one of the giveaways to see how it works and found that almost all utilize the same template, which pretends to be a crypto investment platform,” BleepingComputer says.