Error message

  • Warning: ini_set() has been disabled for security reasons in drupal_environment_initialize() (line 692 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in drupal_environment_initialize() (line 695 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in drupal_environment_initialize() (line 696 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in drupal_environment_initialize() (line 697 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in drupal_environment_initialize() (line 700 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in drupal_environment_initialize() (line 702 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in include_once() (line 337 of /home/scamwatc/public_html/sites/default/settings.php).
  • Warning: ini_set() has been disabled for security reasons in include_once() (line 338 of /home/scamwatc/public_html/sites/default/settings.php).
  • Warning: ini_set() has been disabled for security reasons in include_once() (line 346 of /home/scamwatc/public_html/sites/default/settings.php).
  • Warning: ini_set() has been disabled for security reasons in include_once() (line 353 of /home/scamwatc/public_html/sites/default/settings.php).
  • Warning: ini_set() has been disabled for security reasons in drupal_settings_initialize() (line 806 of /home/scamwatc/public_html/includes/bootstrap.inc).
  • Warning: ini_set() has been disabled for security reasons in drupal_settings_initialize() (line 815 of /home/scamwatc/public_html/includes/bootstrap.inc).

Cybersecurity, Scam & Cybercrime Awareness

 What is a Keylogger?

What is a Keylogger?

19 January 2020

A keylogger (short for keystroke logger) is a Malicious software (malware) that tracks or logs the keystrokes on your keyboard typically in a covert manner so that you don’t know that your actions are being monitored.

What is a brute force attack?

What is a Brute Force Attack?

17 January 2020

A brute force attack, also known as an exhaustive search, is a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered. The longer the password, the more combinations that will need to be tested.

What is malware?

What is Malware?

13 January 2020

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers/cyber criminals, designed to cause extensive damage to data and systems or to gain unauthorized access to a network

What is Ransomeware?

What is Ransomware?

13 January 2020

Ransomware is malicious software with one aim in mind: to extort money from its victims. It's one of the most prolific criminal business models in existence today, mostly thanks to the multimillion-dollar ransoms criminals demand from individuals and corporations. These demands are very simple: pay the ransom, or have your operations severely compromised or shut down completely.

What is spoofing?

What is spoofing?

13 January 2020

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

What is phishing? and how to avoid it

What is phishing?

13 January 2020

Phishing is the fraudulent use of electronic communications e.g email, sms , phone call etc. to deceive and take advantage of users. Both individuals and organizations are at risk; almost any kind of personal or organizational data can be valuable, whether it be to commit fraud or access an organization’s network. 

Pages

Subscribe to Scamwatch Nigeria RSS