Revolut amps up fight against impersonation scams

Revolut, the global fintech with more than 65 million global customers and 12 million in the UK, is today launching a new in-app feature designed to protect users from one of the most insidious types of fraud: impersonation scams. The new feature detects when a customer opening the Revolut app is on the phone – this includes apps allowing voice calls – and confirms whether they are, or not, talking with a Revolut agent. It goes one step further than similar features in the market, helping customers promptly take the right action to report attempted fraud and keep their funds safe if it is found they’re being targeted.

With the rise of AI-generated deepfake voices and increasingly sophisticated social-engineering tactics, criminals are finding new ways to convince consumers they are speaking to their bank or somebody they trust. Impersonation scams trick victims into believing they’re on a legitimate call with a trusted financial institution or person – often pressuring them to move money to safer accounts, to share sensitive data, or to approve fraudulent transactions.

This threat is accelerating rapidly. Scammers can now generate highly convincing scripts and even synthetic voice mimics. Concerningly, A 2021 study found that only 25% of people can accurately distinguish a deepfake voice from a real one – however, most participants falsely believed they could identify the fakes. This leaves people vulnerable to scams – only adding to the surge of APP (Authorised Push Payment) fraud.

Empowering users with timely, actionable protection

Revolut’s new feature introduces a live in-app banner that appears the moment the app detects the user is on a phone call. The system identifies whether the call is coming from Revolut or from another number and advises accordingly:

  • If the caller is Revolut, the banner will confirm that the call is legit
  • If the caller is not Revolut, the user will see a clear, urgent banner informing them that they are not on a call with Revolut
  • Tapping the banner leads users to actionable protection pathways based on what’s happening.

This real-time contextual system provides an additional layer of defence against impersonation attempts that occur during live calls – a scenario where victims can be caught off guard and vulnerable under pressure.

Rami Kalai, Product Owner at Revolut said: “Revolut is committed to building a safer financial future. As fraudsters adopt AI and advanced deepfake tools, we need to innovate fast to defend our customers and stay ahead of rapidly evolving fraud threats. This new feature not only gives users real-time, contextual warnings in the moment they need them most but also guides them to identify impersonation scams providing clear, actionable steps to keep their money safe while the fraud attempt is happening.”

A broader strategy to protect customers

This launch builds on a suite of recent features introduced by Revolut to protect customers from scams and unauthorised activity. In 2024 alone, Revolut’s advanced fraud-prevention systems saved customers more than £600 million that would have otherwise been lost to scams. Recent releases include:

  • In-App Calls – allowing customers to speak to Revolut directly and securely via the in-app feature, eliminating the need to trust phone numbers received externally in the vast majority of cases.
  • Wealth Protection and Street Mode – features designed to keep transfers safe through biometric verification and delay them, in the case of Street Mode, to contrast specific events like transfer mugging.
  • Enhanced machine-learning systems that detect and block risky transactions before they leave a customer’s account.

The new feature is already active for all Revolut customers with an iOS device. Android users will need to proactively authorise the feature from the Security Hub.

Disclaimer

This feature is optional for Android users and does not guarantee complete protection

5 Ways Employment Lawyers Can Help You Protect Your Career

While most of us hope never to find ourselves needing legal representation, as a professional, there’s a good chance you will encounter workplace situations that call for legal guidance. Employment law is incredibly complex, which makes it tricky to manage specific workplace situations without the help of an experienced employment lawyer at HKM.com.

From unfair dismissal and dealing with sexual harassment in the workplace to understanding on-compete agreements and more, here are five times it’s in your best interest to rely on an employment lawyer. 

Review An Offer Letter And Employment Contract

If you’ve recently been offered a new job, there’s no doubt you’re thrilled to get on board to enjoy the position’s better perks and salary. However, employment contracts and offer letters can sometimes be quite deceiving. There’s often a lot of fine print and confusing terms and conditions. 

Contractual clauses like non-compete, non-disparagement, and non-solicitation are common examples of employment contract clauses that you might not fully understand. Instead of signing documentation that could later land your career in hot water, it’s best to consult legal experts to review the offer letter and contract.

Review A Severance Package

Whether you have been retrenched, unfairly dismissed, or let go from your position for any other reason, it’s crucial to consult an employment lawyer to review your severance package before you accept your employer’s offering. 

Often, severance packages don’t provide sufficient benefits and compensation to employees. So, to ensure you receive a fair severance package with rightful pay, contact a lawyer to negotiate the package with your employer. 

Whistleblowing

Blowing the whistle on illicit activity in your place of work is a delicate undertaking. Even if your employer has whistleblowing policies and procedures in place, you might be rightfully concerned about potential backlash in the form of retaliation. 

Fortunately, retaliation bothers labor laws. So, the best course of action is to consult an employment lawyer to assess the situation and guide you through the process of safely blowing the whistle on wrongdoing in your workplace. 

Negotiating Injury Compensation Payouts

Workplace injuries are prevalent in specific industries. But at the same time, injuries can occur in just about any work environment. If you have been injured at work, you are entitled to compensation and benefits that cover your medical bills and more. 

But if you don’t have the expertise of a legal professional, you might not receive the compensation you really deserve. 

Court Representation

Whether you are claiming unfair dismissal, discrimination, unfair treatment, disputing clauses, or claiming compensation, there are times when these matters may go to court. Instead of facing your employer’s legal team alone, it’s worthwhile to rely on legal representation. 

Your employment lawyer will ensure you are treated fairly throughout the process of appearing in court and after that. 

Facing workplace disputes and conflicts can be stressful. Handling things the wrong way could jeopardize your career path and reputation as a professional. Fortunately, lawyers can build and strengthen your case to protect your best interests and the future of your career. 

 

6 Ways To Protect Yourself From Hackers

Hacking has been making waves in the tech world, especially since the rise of cryptocurrency. It’s a realm where brilliant minds seek innovation and disruptors try to cause chaos. Shockingly, recent data show that Ireland saw a 37% surge in cryptocurrency theft, totalling about €1.8 billion. Here’s the reality: the risk of getting hacked is greater than ever as these cunning cybercriminals evolve. However, you can fortify your defences by understanding their tactics. Here are six ways you could fall victim to hacking. 

  1. Smartphone apps 

Many people have and love those handy apps that make life easier. In today’s digital world, they’ve become essential. However, your smartphone could be more vulnerable if you’re an Android user without two-factor authentication (2FA). Android’s open-source operating system, while offering flexibility, can be a playground for viruses, making it less secure than the iPhone. When you open an app, you often share sensitive information, potentially giving hackers an open door. The solution is to be picky with your app choices, focus on the ones with credible ratings and reviews, and beef up your security with Two-Factor Authentication on all apps and devices. Don’t forget to double-check your links too. 

    2. Sites-cloning and phishing

Site cloning and phishing are a classic that has been around since the ‘dot-com revolution.’ As they say, ‘the old ones are the best.’ In one scenario, the cyber tricksters create a near-perfect replica of a legitimate website, hoping to trick you into entering your password or secret key. They might even slightly alter the website’s domain, so be vigilant. In the second scenario, they send emails that look identical to official communications but aim to trick you into clicking a malicious link and giving away your data. Trust your instincts, and if something feels off, delete it. Stick to websites with genuine HTTPS protocol. 

   3. Beware of public Wi-Fi

Public Wi-Fi is a hacking scenario that many naturally fear. Your device can connect to a hacker’s Wi-Fi network through a misleading link or accidentally choosing the wrong network. Anything you download or send while connected to that network is fair game for hackers. They can access your private keys from crypto wallets, online banking details, email passwords, and more. This issue is especially critical when using public Wi-Fi in railway stations, airports, hotels, or any crowded spot. Hackers can lurk incognito, waiting for an unsuspecting victim. The rule of thumb here is never to use public Wi-Fi for financial or sensitive transactions, not even with a VPN. Also, keep your router firmware updated, as manufacturers frequently release updates. Meanwhile, you can use SSID as an alternative. But what is SSID? It stands for Service Set Identifier, enabling you to learn more ways to protect yourself on Wi-Fi networks. 

   4. Malicious USB sticks 

You’ve probably heard stories of people finding USB sticks in parking lots and trying to do the right thing by returning them. However, there’s a darker side to this scenario. Sometimes, these USB sticks are loaded with malware and intentionally left by criminals. You don’t need to be the target of a specific attack to fall victim to malware. Inserting random devices like CDs, DVDs, USB drives, or any other found peripherals, such as a mouse or keyboard, puts you at risk of getting hacked. To protect yourself, use reputable antivirus software and make sure it scans all connected devices. While it’s not foolproof and can’t catch every threat, it significantly reduces the chances of falling prey to random malware or malware created by less skilled attackers. 

    5. SMS authentication 

SMS for authentication may seem like a quick and familiar way to confirm your identity, but it’s not as secure as you think. Positive Technologies, a cybersecurity company, has shown how easy it is for attackers to intercept SMS messages containing password confirmations, thanks to the Signalling System 7 (SS7) protocol used worldwide. They demonstrated that any system relying solely on SMS can be accessed by hackers, even if 2FA is used. To protect yourself, turn off call forwarding to prevent data access and consider using a software-based authentication solution instead. 

    6. Malicious documents

Hackers often hide malware in seemingly harmless Office documents like Word or Excel. When you open these files, your computer can get instantly infected. These malicious documents typically arrive in your inbox, disguised as seemingly secure emails. Upon opening, you might receive a pop-up message prompting you to enable macros to view the document’s content. If you allow macros, your computer becomes susceptible to malware attacks. So, avoid enabling macros and never open attachments from suspicious emails or unknown contacts. 

HP Expands the Boundaries for Remote PC Management through HP Wolf Connect

At its Amplify™ Partner Conference, HP Inc announced HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline.

Using a cellular-based network, HP Wolf Connect’s robust connectivity  helps ensure IT teams can readily manage a dispersed hybrid workforce. It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimise asset management.

“Hybrid work has made remote management at scale more complex for IT teams, yet even more essential,” comments Neil Dover, Country Manager at HP Ireland. “As we adapt to the hybrid work model the cloud has helped but hasn’t solved IT’s ability to manage devices that are powered down or offline. HP Wolf Connect’s highly resilient connection opens new doors to remote device management, enabling efficient and effective management of dispersed workforces.”

HP Wolf Protect and Trace with Wolf Connect is the world’s first software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet. This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organisations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organisation’s security posture. The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead.
  • 70% say that hybrid work increases the risk of lost or stolen devices.

“Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down. This is particularly crucial in industries where devices may contain PII (personally identifiable information) or intellectual property. Now, teams can accurately report where and when devices were lost, and how long it took to lock or erase them,” continues Dover.

Securing the endpoint is ground zero for attacks on hybrid workers

Beyond PC loss and theft, the endpoint i.e., laptops, PCs or printers – continue to face serious threat from ransomware and is ground zero for attacks on hybrid workers. This requires the creation of new cybersecurity strategies and innovative security tools in response to changing employee behaviours.

  • 84% of security leaders say the endpoint is the source of most security threats and where the most business-damaging security threats happen.
  • 66% say the greatest cybersecurity weakness is the potential for hybrid employees to be compromised; with phishing, ransomware, and attacks via unsecured home networks cited as the top risks.
  • 65% say it is challenging to update their threat detection measures (e.g., Endpoint Detection & Response and Security Information and Event Management tools) to reflect the behavior of hybrid employees, making it harder to spot attacks.3
  • Three-quarters (76%) of security leaders agree application isolation is key to protect hybrid worker devices, but only 23% are benefiting from using it at present; with 32% planning to deploy in the next 12 months.

“The shift to hybrid work requires a move away from old perimeter-focused thinking. To close gaps, organisations must put the endpoint front and centre of any security strategy. Adopting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be key for protecting users without impinging on the freedoms that hybrid work allows,” concludes Pratt.

Hybrid work security is a key focus for 2023

HP’s new hybrid security research details how security teams are prioritising securing the hybrid workplace:

  • Four-in-five (82%) security leaders have increased their cybersecurity budget specifically for hybrid workers. 71% expect this hybrid investment focus to increase further in 2023.
  • 80% have deployed a different set of tools and policies to protect hybrid employees.
  • 70% are limiting network access of people working remotely to minimise the risk of a breach.

To learn more, download HP Wolf Security’s latest report for IT decision makers and for Security Leaders.

Cybersecurity in the Age of Technology: Protecting Your Business Against Digital Threats

Technology has brought significant advancements in business operations and communication in today’s digital age. With the rise of the internet and the widespread use of electronic devices, businesses now have access to new ways of reaching their customers and conducting transactions. However, this increased connectivity also comes with significant risks, as cyber threats have become more sophisticated and prevalent than ever before. As a business owner or manager, it is essential to understand these threats and take steps to protect your company’s digital assets. This article will discuss some of the most common digital threats facing businesses today and provide tips on mitigating them.

The Importance of Cybersecurity

Cybersecurity refers to the practice of safeguarding electronic devices, networks, and sensitive information from unauthorized access, theft, or damage. Businesses must prioritize cybersecurity to prevent data breaches, financial loss, and damage to their reputation. A successful cyber attack can have devastating consequences, from legal liabilities to loss of customer trust.

In today’s digital age, businesses of all sizes are vulnerable to cyber-attacks. Cybercriminals use sophisticated techniques to exploit vulnerabilities in a company’s security systems, gaining access to sensitive data and causing extensive damage. Businesses need to implement robust cybersecurity measures to protect themselves against these threats.

Data breaches and cyber attacks can result in significant financial loss for businesses, including fines, legal fees, and damage to their reputation. These attacks can also result in losing customer trust, which can be challenging to regain. Businesses must invest in cybersecurity measures that can effectively detect and prevent cyber threats.

Common Cyber Threats

  • Phishing Attacks

Phishing attacks are a type of cyber attack that is prevalent today. They often use email or social media to trick people into revealing sensitive information, such as login credentials or credit card numbers. Phishing attacks usually come in the form of a fake email that appears to be from a legitimate source, such as a bank or a social media platform.

  • Ransomware

Ransomware is another type of cyber attack that has become increasingly common. It is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. Ransomware attacks can be devastating, leading to permanent data loss if the victim does not pay the ransom.

  • Malware

Malware is a broad software category designed to harm or exploit computer systems. Common types of malware include viruses, Trojans, and spyware. Malware can be used to steal sensitive information, damage computer systems, or control devices remotely. Cybercriminals use malware to gain access to sensitive information, steal financial information, and cause damage to computer systems.

Phishing attacks, ransomware, and malware are serious threats that individuals and businesses must be aware of. Taking proactive steps to protect sensitive information and prevent cyber attacks is essential to safeguard against the potentially devastating consequences of these attacks. Regularly updating software and antivirus programs, being cautious of suspicious emails or messages, and having a backup system in place are all effective ways to protect against cyber threats.

Cybersecurity Best Practices

  • Implement Strong Password Policies

Implementing strong password policies is one of the most effective ways to prevent cyber attacks. A good case in implementing a strong password policy can be low deposit casino UK who also needs to ensure they have strong security measures to protect your personal and financial information. Encourage employees to use complex passwords and to change them frequently. Consider using two-factor authentication to provide an extra layer of security. In addition to implementing strong password policies, businesses should consider using password managers. Password managers can generate complex passwords and securely store them, reducing the risk of employees using weak passwords or reusing passwords across multiple accounts.

  • Keep Software Up-to-Date

Software vulnerabilities are a common entry point for cyber attacks. Ensure that all software your business uses is kept up-to-date with the latest security patches and updates. Regular software updates and security patches can help prevent cyber attacks that exploit known vulnerabilities in outdated software. Implementing automatic updates or using a patch management system can ensure that all software is updated promptly.

  • Backup Your Data Regularly

Regularly backing up your data is essential to prevent permanent data loss during a cyber attack. Make sure that backups are stored in a secure location and that they are tested regularly to ensure that they can be restored if needed. Backups should be performed periodically and stored in a secure offsite location to protect against data loss due to cyber-attacks, natural disasters, or hardware failures. It is also essential to regularly test the backups to ensure they can be restored in a disaster.

  • Train Your Employees

Employees are often the weakest link in a company’s cybersecurity defences. Make sure that all employees receive regular training on how to identify and avoid common cyber threats. Encourage employees to report any suspicious activity immediately. Employee training should be ongoing to keep employees aware of the latest cyber threats and best practices for preventing them. This should include regular phishing awareness training, as phishing attacks are becoming increasingly sophisticated and challenging to detect.

Businesses should also have an incident response plan in place in case of a cyber attack. The plan should include procedures for identifying and containing the attack, notifying stakeholders, and recovering from the attack. Regular testing and updating of the project can ensure it is effective during an attack.

Conclusion

Cybersecurity is essential for businesses of all sizes in today’s digital age. By understanding the most common cyber threats and implementing best practices to prevent them, you can protect your company’s digital assets and reputation. Remember to keep your software up-to-date, back up your data regularly, and train your employees to identify and avoid cyber threats. By taking a proactive approach to cybersecurity, you can reduce the risk of a cyber attack and ensure the long-term success of your business.

How Can You Protect Your Privacy When Gambling Online?

Gambling online is a common way to play games and earn money. However, protecting your privacy is extremely important when gambling online. You want to make sure you are only using secure platforms and that your money is protected.

Use a VPN When Online

One of the most common ways to protect your privacy is by using a VPN when gaming online. VPNs hide your IP address which makes it harder for hackers to hack into your computer and find your information. 

Keep in mind though that not all online casinos allow VPNs since casinos are regulated to only allow players from certain states or regions.

Keep Your Password Strong

When using online casinos, you have to first make an account with the website. Make sure you are using a strong and unique password. Never use the same password for all your online casino accounts. 

You should also never give your password to anyone. For extra security, make sure you change the password every few months to protect against hackers.

Use E-Wallet Payment Methods

You will need to add payment methods to your casino account to begin gambling and playing the casino games. The safest payment method you can have is by adding methods through an e-wallet. 

E-wallets do not show the card number to the provider, so hackers will not be able to see the card number even if they somehow hack into the casino’s platform.

Try Casinos That Accept Cryptocurrency

There are many casinos that accept cryptocurrency as gambling with cryptocurrency has become very popular over the past few years. These casinos protect your money since you are directly using your bank account or a credit card. 

Red Dog Casino is a great platform to gamble responsibly. They have a wide range of games that you can all play with cryptocurrency. They also have extremely efficient customer support which you can contact if you happen to have a chance with your payment method.

Only Use Casinos With Top Security Levels

Before using any online casino, make sure you verify their security levels. The ways they secure your information are usually listed on their website. You can always contact their support team if you want more information. 

You should also make sure to read reviews. Most online casinos have reviews online where you can see what other customers are saying. If you see any reviews that mention poor security or identity theft, make sure you use another casino. 

Most online casinos are safe as long as the platform is taking the right security measures. When you know your information is secure, you can spend more time enjoying the games and less time worrying.

Don’t Rely on Private Browsing Tabs

Many people are under the impression that using a private browsing tab is enough to keep their information secure but this is not the case. However, private tabs only clear the cookies and history of the computer. 

However, they are not as good as password-protected browsers. You can use a private tab along with other security measures, but do not rely on it alone.

Authorised Casinos Only

If you are using an authorised casino and following the safety tips above, it’s very hard for a hacker to get your information. If you notice that your banking information or your account has been compromised, you need to cancel it right away so the hacker does not have access to more of your money. 

You can also contact the online casino and let them know there has been a breach in security so they can notify others.