DISCLAIMER: The solutions presented on this page are the property of ACME LABS Sp. z o.o. and are subject to legal protection in Poland and abroad, on the basis of intellectual and industrial property rights.

  • Is electronic communication secure?
  • Can we be sure of the source of the message we receive?
  • Do the links lead where they should be?
  • Shall we always trust the content of the attachments?

Digital world of the Internet offers unique solutions but on the other hand requires vigilance and awareness of threats. User's mistake can be used against him/her and the mistake can have far reaching or even unlimited consequences. What's more, we can often be prompted or provoked to commit mistakes by actions that we do not identify as a threat. We can be the target of an attack that can have far-reaching consequences for us, for our identity, as well as for our resources, including assets and cash.

Even if at first glance everything seems fine with the email - the information it contains, the attachment or link can be potentially very harmful. Why? The answer is simple - it is possible to impersonate the sender's e-mail address; you can also send an email from an address or domain that looks very similar to any other. This may already be the first step to large-scale fraud, whose harmful effects and costs can sometimes be difficult to estimate and which often cannot be reversed.

Effects related to relying on erroneous information, malicious attachments or links contained in messages (email, sms or others)

threats_1
Installing of ransomware - software that encrypts data and demands ransom
threats_2
Taking control of user's accounts and using them in various fraud scenarios (e.g. phishing of payment codes)
threats_3
Installation of spyware that spies on user's devices and infrastructure
threats_4
Sending fake invoices and getting the user to make payment to the false account
threats_5
Directing the user to fake payment processing page
threats_6
Sending by email information on the change of account number to which a payment shall be made.
threats_6
Takeover and using of computing power of user's device for mining of crypto-currencies
threats_6
Takeover and using the device and infrastructure to attack other devices, networks, systems (botnets)

ABOUT US

The digital age gives us many benefits and possibilities, but at the same time it presents us with challenges related to the need to ensure adequate security of infrastructure, devices and privacy of our data. In particular, this applies to electronic communication (e.g. email, SMS, MMS, messengers), where human weaknesses can be the reason for the loss of resources, cash or identity. Our goal is to add an additional layer of security to the world of digital communication that will make it safer.

CONTACT US