ESET Southern Africa Archives - PC Tech Magazine https://pctechmag.com/topics/eset-southern-africa/ Uganda Technology News, Analysis & Product Reviews Thu, 21 Nov 2024 08:38:53 +0000 en-US hourly 1 https://i0.wp.com/pctechmag.com/wp-content/uploads/2015/08/pctech-subscribe.png?fit=32%2C32&ssl=1 ESET Southern Africa Archives - PC Tech Magazine https://pctechmag.com/topics/eset-southern-africa/ 32 32 168022664 How to Stay ahead of Social Media Shopping Scams this Black Friday https://pctechmag.com/2024/11/stay-ahead-of-social-media-shopping-scams-this-black-friday/ Thu, 21 Nov 2024 08:38:53 +0000 https://pctechmag.com/?p=80957 If a deal or an ad feels off, take a moment to double-check because protecting yourself online is just as important as finding a Black Friday bargain.

The post How to Stay ahead of Social Media Shopping Scams this Black Friday appeared first on PC Tech Magazine.

]]>
Shoppers are turning to their social media feeds to find the best Black Friday deals —unfortunately, cybercriminals aren’t far behind. In 2023, an estimated 90.6 million people worldwide shopped online on Black Friday. While seasoned shoppers may feel confident in avoiding scams, fraudsters have become adept at blending in with the flood of social media discounts. Leveraging the trust consumers place in these platforms, cybercriminals mimic legitimate brands and deals, making it all too easy for shoppers to overlook critical warning signs in their rush to snag a bargain.

Common social media shopping scams

  1. Fake or cloned websites: One of the most common scam tactics involves directing shoppers to websites that look identical to those of reputable brands. These sites use similar branding, logos, and layouts, but have subtle differences in the URL, such as .co instead of .com or .co.za. The pressure of losing out on the Black Friday deal can make consumers less vigilant, which fraudsters exploit by creating fake sites that lure shoppers in with unbeatable offers.
  2. Deceptive dropshipping ads: Several ads on social media lead to dropshipping sites masquerading as local businesses, promising quick delivery and premium products. Shoppers may not realize they’ve purchased low-quality knockoffs until their orders arrive, with little to no recourse for returns or refunds. These ads often present as South African-based companies but are sourcing cheap goods from overseas, relying on the perception that because the advert appears on a reputable social media platform, the store is 100% legitimate too.
  3. Phishing for personal and payment details: Social media scams frequently employ fake checkout pages or order forms to harvest sensitive information. These sites often display trusted payment icons, creating a false sense of legitimacy. If a site linked to social media seems suspicious, avoid entering personal details. Scammers often use this information for fraudulent transactions.
  4. Black Friday giveaways and limited offers: Scam ads offering Black Friday giveaways or urging users to act quickly are designed to bypass normal caution. These pages might ask users to claim a prize by entering personal information or paying a small fee. Countdown timers and ‘last chance’ messages are used to create a sense of urgency, but it’s worth keeping in mind that legitimate retailers don’t use these methods like this to pressure shoppers.

Tips for social media shoppers

  • Only trust ads from verified brand accounts, indicated by a blue checkmark, and review their post history and follower count to ensure you’re engaging with the real account.
  • Double-check URLs carefully. Scammers use slight URL variations to mimic official sites. When in doubt, type the brand’s website into your browser directly.
  • Take a second look at deals that seem too good to be true. While Black Friday discounts are enticing, extreme markdowns, especially on high-end products, are red flags not to be ignored.
  • Check for clear contact details. Legitimate sites usually display a customer service phone number, address, or live chat. A lack of contact options should be viewed with suspicion.
  • Ensure your security is up to date. Cybersecurity solutions like antivirus, firewalls, and internet protection must be installed on any connected device, especially your mobile phone.

It’s important to balance the excitement of shopping with a healthy dose of caution. By being a bit more vigilant, consumers avoid cybercriminals looking to make a quick buck. If a deal or an ad feels off, take a moment to double-check because protecting yourself online is just as important as finding a Black Friday bargain.

Editor’s Note: This article is written by Cybersecurity specialists at ESET Southern Africa

The post How to Stay ahead of Social Media Shopping Scams this Black Friday appeared first on PC Tech Magazine.

]]>
80957
5 ways SME’s can protect themselves from cybercrime this tax season https://pctechmag.com/2015/07/5-ways-smes-can-protect-themselves-from-cybercrime-this-tax-season/ Tue, 14 Jul 2015 09:44:44 +0000 http://pctechmag.com/?p=23931 It is a well known fact that attackers like to find low hanging fruit in order to get…

The post 5 ways SME’s can protect themselves from cybercrime this tax season appeared first on PC Tech Magazine.

]]>
It is a well known fact that attackers like to find low hanging fruit in order to get into an organisation’s juiciest targets.

Some times this is through outside vendors, other times this is through phishing of individuals in an organisation of whom they can make use as a foothold to get into accounts with access to more valuable data.

In this recent uptick in tax identity fraud, criminals have been targeting the HR departments of various companies in order to file fraudulent tax returns, says Carey van Vlaanderen CEO of ESET Southern Africa.

What can we do?

Many smaller companies feel that they are less apt to be targets of cybercrime because they think they have “less value” as a target. Furthermore, they may feel they do not have the budget to protect themselves. Criminals can and will use any tidbit of information they can gather in order to increase their payout.

In light of this, small businesses need to be every bit as cognizant of protection as larger organizations and to avail themselves of the many ways in which they can protect themselves at little or no extra cost. For instance, it is important to express caution when using web-based tax preparation programs. However, there are many secure online systems for tax preparing, but research, ratings, and reviews are crucial in determining which programs are safe and secure.

Two-Factor Authentication: Whenever this option is available, whether for payroll companies or when using any other online services, you should enable it.

Anti-Phishing Scanning: When criminals become aware of poorly defended third-party sites that are of value to them, they can use their login credentials.  Using anti-phishing scanners in browsers and email can greatly decrease the likelihood of users being tricked into disclosing their login credentials. While education is very helpful (and highly recommended)  to prevent phishing, fraudsters can sometimes craft links that are compelling enough to trick all but the most expert users.  Anti-phishing scanning can be extra helpful with those particularly deceptive phish.

Anti-Malware Technique and Technology: Criminals may also target users with malware that has keystroke logging, which would allow them to steal login credentials without having to trick users into going to a phishing site.  The usual anti-malware advice applies here: be sure to keep all your software up to date, educate your users about when it is unsafe to open attachments, and use updated anti-malware and firewall software.

Network Segmentation: The best way to limit the damage should a criminal gain access to an organisation is to set permissions within your organisation. Allowing access to only those things a user must access, in order to do his or her job.

Encryption: Encrypted data may be less accessible and thus less valuable to criminals. When data has been transferred onto disks, make sure that they are encrypted. Most major operating systems offer this ability at no extra cost. Encrypting sensitive data in transit is important too. Email and IM are not generally encrypted, unless you use a separate program designed to encrypt this traffic. Web traffic may be encrypted – look for HTTPS or a lock icon at the beginning of a URL to see whether the traffic has been secured. (But be aware that phishing sites sometimes use fake lock icons to inspire misplaced confidence in the unwary user.)

Whether your business is big or small the  methods are much the same (small businesses simply have less organisational and technological complexity). Thankfully, as protection technology has improved, it has also become cheaper and easier to access and to use effectively.  By taking the time to apply these protections, businesses can make themselves less attractive to criminals.

The post 5 ways SME’s can protect themselves from cybercrime this tax season appeared first on PC Tech Magazine.

]]>
23931