Cybercrime

The Google Voice Verification Code Scam – Or the simplest methods are often the most effective

You will probably not have heard of it, but the Google Voice Verification Code Scam is an excellent example of how the simplest methods are often the most effective and how easy it to become unwitting accomplice of fraudsters and scammers. The Growing Threat of Cyberattacks The news are full of cyberattacks of large proportions. …

The Google Voice Verification Code Scam – Or the simplest methods are often the most effective Read More »

Practical Examples of Cyber Attacks: Fake Purchase Orders and Phishing Scams

Regulators warn against scams related to the Covid-19 pandemic seemingly on a daily basis. It is high time for cybercrime who try to take advantage in various ways of the Coronavirus crisis. Fake purchase orders and phishing attempts aren’t an invention made especially for the current emergency, but play perfectly to the uncertainty and confusion created …

Practical Examples of Cyber Attacks: Fake Purchase Orders and Phishing Scams Read More »

Cybersecurity and the Need for Harmonisation of Rules

Existing gaps in the current structure and recent efforts for a better regulatory framework are not enough to strengthen operational resilience in the financial services sector against cyber attacks and make the EU ready for the digital future. Just this morning the German regulator BaFin together with the German Federal Cyber Security Authority a report …

Cybersecurity and the Need for Harmonisation of Rules Read More »

Fighting Financial Crime during the Coronavirus Pandemic

Several countries have begun to ease the restrictions they have introduced to fight the spread of the Coronavirus. Only time will tell whether we are on the right track. But there is hope that these societies are taking small steps back into normality. After the immediate fight to limit infections and focus on treating the …

Fighting Financial Crime during the Coronavirus Pandemic Read More »

Don’t fall for these Coronavirus Scams (Part 2): The Regulatory Response

An overview of regulatory advice regarding Coronavirus Scams and cybercrime With millions of confirmed cases of Coronavirus and casualties in the hundreds of thousands, the pandemic is the biggest challenge for the world since World War Two. These were the words by the UN Secretary General António Guterres and the World Bank has warned that …

Don’t fall for these Coronavirus Scams (Part 2): The Regulatory Response Read More »

Go Phish! The Fraudulent Email from the Web Security Team

Got an email from the Web Security Team re suspicious log in activity? Careful where you tread because one click could break the ice! A case study in phishing and email spoofing If you are a small startup like us, there are plenty of things that keep you busy. Product development, people management, infrastructure, financing, …

Go Phish! The Fraudulent Email from the Web Security Team Read More »

StartUp advice: How to protect your company blog from spreading the Emotet Trojan

Remember Emotet? No, we are not talking about some Egyptian King and the latest exhibition showcasing his treasures. It’s the name of one of the most vicious pieces of malware of recent history. It has made the rounds for several years but reports from last week that it could be spread through blogs and websites …

StartUp advice: How to protect your company blog from spreading the Emotet Trojan Read More »

Life Beyond Brexit – Key Aspects from the FCA’s Business Plan

Right in time for the long Easter weekend, the UK’s Financial Conduct Authority (FCA) last week issued its annual business plan for 2019/2020. On 56 pages it sets out the regulator’s main areas of focus, outlines priorities and describes how the FCA intends to tackle the issues it has identified. From supervisory priorities to market …

Life Beyond Brexit – Key Aspects from the FCA’s Business Plan Read More »

Scroll to Top

Add Article

Add your article to Planet Compliance.