DISCLAIMER: The solutions presented on this page are the property of ACME LABS Sp. z o.o. and are subject to legal protection in Poland and abroad, on the basis of intellectual and industrial property rights.

NEWS&MEDIA


Using BLIK and Facebook to steal funds from a bank account

BLIK is a nice, fast and pleasant payment both in the store and online. I must admit that it makes our everyday shopping easier, but it should be emphasized that some of us also make us lazy - for payment, all you need is an installed banking application and confirmation of payment with a PIN. This allows us to avoid a much longer process of logging into the bank or entering a long account number or card.

Watch out for bargain purchases, leading to the theft of funds from your bank account

The greedy loses twice - although this proverb is known to many Internet users, hardly anyone applies it to himself. Unfortunately, this is used by criminals who, thanks to simple tricks, can persuade people to share access to their bank account. A new group and a new robbery scenario have appeared on the Polish market of (cyber) criminals.

How do phishing authors circumvent multi-factor authentication?

Phishing attacks are commonplace, and defending against them can be based on many factors. One way to effectively protect yourself from the effects of phishing is MFA, but is it always fully effective? Multi-factor authentication (MFA) is presented as a protection against 99.9% of phishing attacks (according to Microsoft) and should be used wherever possible.

Stolen Fortnite Accounts Earn Hackers Millions Per Year

More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone. Hackers are scoring more than a million dollars annually selling compromised accounts for the popular Fortnite video game in underground forums. With Fortnite’s immense popularity skyrocketing over the past few years – it currently has more than 350 million global players – the game is a lucrative target for cybercriminals.

Increase in the number of cyber attacks on cloud services

Cybercriminals use a hitherto unknown phishing attack technique, in which they use popular cloud services, including Google Cloud, to impersonate recognizable institutions in order to infect computers. Thanks to hosting in popular clouds such as Google Cloud or Microsoft Azure, hackers create websites pretending to be well-known institutions that may not arouse suspicion even among cybersecurity experts.

Over 100,000 victims of Qbot. According to experts, it is a great threat

Over 100,000 people have fallen victim to the new version of malware. According to Check Point experts, it may be the most widespread malware to date. Qbot is a banking Trojan that intercepts data from your internet browser. It collects information such as credit card numbers and electronic banking details. It attacks not only individuals, but it can also threaten enterprises.

Encrypted Drive? - it's not a catastrophe yet!

Ransomware is encryption software that is used by cyber criminals to extort a ransom. If your files have been encrypted and you need help, our guide will tell you what to do. Here are the three most important steps that you must take as soon as you discover that your data has been encrypted: immediately disconnect your devices from the internet (both wired and wireless networks), hibernate your computer (remember, don't turn off your device!), Reset your passwords.

CONTACT US