Smart Tools, Trusted Protection
Stay Safe from Scams!

  • Steganography

    Raise your hand if you watched the web series ‘The Freelancer’? The show in which a new bride ends up getting abducted into Syria, and is rescued back to India. In one scene, the ‘Freelancer’ sends the victim a harmless looking image to click open to infect the antagonist’s phone? That was an example of…

    Read more…

  • Business Email Compromise

    In a little-known story that ran in some local newspapers in May of 2022, a snack and sweets manufacturing firm was duped of over INR 43 lac, the rough equivalent of USD 55,250. This is by no means a small amount for an SME business in India. An official of the firm Siddhivinayak Agri Processing…

    Read more…

  • How not to take the phishing bait

    The popular cab aggregator Uber became a victim of a massive data breach in Sep of 2022. And how did the attacker get access to the sensitive internal systems? It turns out that the supposedly eighteen year old attacker who was eager to take responsibility for the successful attack said “I was spamming [an] employee…

    Read more…

  • The less talked about Immigration Scams

    Every day, we hear about people losing their hard-earned money to the classic romance scams, investment schemes and job and work from home scams. A relatively lesser-known scheme which is often a variant of job scams, is very surgically targeted at victims looking to relocate to foreign shores. These are often hard to crack by…

    Read more…

  • I Got Scammed, How Do I Get My Money Back?

    Originally published for online magazine the420.in by Shweta Patel As a fraud prevention expert, I get this question a lot. Others in the fraud-fighting domain like me, also probably receive similar questions from people who have been a victim to online scams or cybercrime. So, I wanted to write this article, almost as a PSA….

    Read more…

  • Password hygiene and Authentication Best Practices

    A password is nothing but a method of authentication, so that an application can validate that a user is truly themselves. There are 3 types of ways to authenticate a user. Knowledge based, Possession based and Inherence. These are respectively what you know, what you own and who you are. Knowledge based can be either…

    Read more…

  • Be cyber safe!

    Cybercrimes and digital scams are an issue that is growing every day. Often retired people lose their life savings to shameless fraudsters. –Originally published in Pune Mirror on 27 Mar 2023, by Shweta Patel– Cybercrimes and digital scams are an issue that is growing every day. Often retired people lose their life savings to shameless…

    Read more…