(or Stealth IT), is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval.
|Social Media Fraud||
Suspicious Profiles on any social media websites that have association with the client
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.
Shutting down of fraudulent profiles that affect a brand or individual including cybersquatting
|Text sharing sites||
Uploading texts/copyright infringement
any word, name, symbol, or design, or any combination thereof, used in commerce to identify and distinguish the goods of one manufacturer or seller
Process by which a user provides two means of identification from separate categories of credentials
Service provider of domain names
|Web Referral Log||
Logs to help analyze traffic to a site
Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti, although recently it has become a means to spread messages by politically motivated "cyber protesters" or hacktivists.
Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities
Pronounced "who is" is a query and response protocol that is widely used for querying databases that store the registered users