Blogs

Add the best talent on the market, an agile skilled management & seamless involvement.

Blog Main Image
Types of Online Fraud During Coronavirus Pandemic
Cyber Security Data Security

6 Types of Online Fraud That Is Taking Place During Coronavirus Pandemic

branex-logo Team Branex

With the world in a state of lockdown and millions of people working from their homes due to the coronavirus, cybercriminals are busy making the most of this opportunity. Cybersecurity firms and cybersecurity researchers have seen a surge in the number of phishing emails, malicious and fake websites, and dangerous apps. These are all the online frauds by nets hackers have placed to steal your data. 

Hackers are also targeting video conferencing and communication apps because they know that there is a pike in active users on these platforms due to remote work. Zoom is the best example in this regard. Its user base grew from 10 million to 200 million active users in less than three months. This exponential growth in the number of users also brought to the attention of cyber criminals who exploited vulnerabilities and compromised user data. Cloud hosting providers must take precautionary measures to protect data stored in the cloud.

Also Read: 5 Tips to Keep Social Media Account Safe

How can you keep yourself safe from online fraud during this pandemic? By knowing about these online fraud methods that hackers are using. That is exactly what you will learn in this article. In this article, you will learn about six types of online fraud which is taking place during the coronavirus pandemic.

Stimulus Fraud

The United States is the worst-hit country due to this coronavirus pandemic. The US government announced a stimulus package which would give out free money to people and businesses to bail them out. To be eligible for a stimulus check, you should be a taxpayer. If you have not paid the taxes for the last couple of years. You might be rushing to file your tax return and hackers know that too.

Cybercriminals will try to steal tax filing data by targeting tax authorities and accounting services. Once the data is stolen, they will use it as a ladder to file fraudulent tax returns with different bank account details. We might also see fraudsters attempting to impersonate small and mid-size businesses so they can apply for stimulus checks and loans.

Malicious Corona Tracking Apps

corona-tracking-apps

As the coronavirus spread worldwide, we also saw an exponential rise in coronavirus-related scams. One method hackers are using is tricking users into downloading a rogue coronavirus tracking app. What is even more interesting is the fact that these apps might look genuine and promise to send alerts and notifications about coronavirus informing you about the spread of the virus. Some of these apps even promise that they can tell you about the virus when it is in your vicinity.

They are usually behind your mobile banking applications and mobile e-commerce apps and want to steal your sensitive financial information such as bank account details and more. Avoid downloading these apps and never fall for these traps. Even if you are downloading any apps related to coronavirus, make sure it is coming from a genuine publisher. Never download apps from third-party sites and always download apps from the Google Play store or Apple app store

Account Takeovers

Hackers require support from a mule to cash out victim bank accounts and make account takeover successful. A mule is a collaborator with a bank account located in the same country as the victim and acts as a middleman. Just like in the 2008 economic crash, mule recruitment is at an all-time high as people tend to reply immediately to any work-from-home offer that comes their way. What they do not realize is that these offers come from a crime ring. With the latest reports showing record-high unemployment, we might see history repeat itself. This could fuel a dark economy and accelerate its growth.

Fake Credit Card Accounts

With millions of people losing their jobs in a couple of months, many more might get laid off. They might not have money to spend on necessities. As a result, they have no choice but to use their credit cards to meet their needs. Some might even think about new credit lines and loans. Even those who don’t have a credit card might sign up for one. In short, this means that credit card websites will see an exponential rise in their traffic.

Fraudsters can take advantage of this situation as there is little to no investigation on suspect cases due to a recession. Hackers will first try to get their hands on these credit cards physically and then use them digitally to fulfill their malicious desires. The number of credit card defaulters will also grow which can complicate things even more.

Social Engineering Attacks from Banks

If you have a bank account, you might receive a fake call, message, or email that pretends that it comes from your bank but it does not. The person on the other side might ask you to share their sensitive financial information such as the user ID and password of your mobile banking app, OTP, PIN code, or account number.

In some cases, they might even ask you to install software or apps. So they can troubleshoot the problem and get it fixed. Never take the action they want you to take until you verify their identity. Never share your sensitive bank account details on a phone call, email, or via text message.

Online Loan Application Fraud

online-fraud-app

As mentioned before, millions of people do not have a job, so they do not have money coming in. This means that they either must take a loan or use their credit card. Lenders are tightening their credit control and making sure that they can get their money back and prevent fraud. With the situation going from bad to worse, we might see lenders loosen their credit control to facilitate users. But it can also open doors for online fraud. Online fraudsters can take advantage of this situation and use stolen records to open accounts to secure loans. Once they get these loans, they will run away with it.

Have you ever been a victim of online fraud? Share your experience with us in the comments section below.

WordPress Security Tips
Cyber Security Data Security

WordPress Security Tips To Make Your Website Healthy, Wealthy and Wisely

branex-logo Team Branex

According to Norton, the cost of a single data breach for a company in the USA is estimated to be $7.9 M. Unless you are Elon Musk or Jeff Bezos, this number should give you a heart attack, or at least prepare you to secure your website before hackers take control of it. As a professional website design agency, we develop hundreds of WordPress websites every year.

This is why we have to take special measures to address the problem of WordPress security and equip you with workable solutions that will prevent hackers from peeking and tweaking your website.

WordPress is one of the solutions that have gotten better with age and has become the primary choice of marketers, bloggers, and entrepreneurs who have something to sell online but don’t know where to begin.

Start with the WordPress login page

wordpress login

1. Avoid using “admin” as your username

Regardless of the level of hacker – the first loophole is the “admin” username. Even a toddler knows that the “admin” username is the primary user with all the access to the website. By default, you’ll be assigned the “admin” username, but instead of presenting the hacker with an easy breach you can change the default username by using an SQL query in PHPMyAdmin. Just ask your website developer and he will understand and rename the username to something else.

2. A Strong Password can save millions

This brings us to the second problem. Even if you have a strong username, hackers can pass the login page if the password is weak.

It is advised to use an alphanumeric username and password which can be 10 – 14 characters long. If you cannot think of something strong, try Strong Password Generator which will definitely generate a secured password for your WordPress website.

Don’t just rely on a one-time password. For security reasons, keep changing your password at regular intervals.

3. Utilize Two-factor Authentication

This is one of the most powerful methods to combat brute-force attacks. The brute force is a form of attack where the hacker tries unlimited combinations of usernames and passwords until they gain access to the website.

If you use two-factor authentication, it will be difficult for the hacker to break the password without first notifying you. The most basic form of two-factor authentication is to access the admin page, you require the combination of mobile code along with the password. Unless the hackers have access to both, they can’t access your website’s secured areas.

4. Personalize login URL

The easiest way a hacker can get access to your website is with the default login URL. With the default login URL - wp-login.php, it will be easy for a hacker to try brute force and gain access to your login credentials. 

You can either change the login URL manually or install the iThemes Security plugin to change your login URLs automatically.

5. Shift to HTTPS

It is a common practice of experienced website developers to switch their WordPress website to HTTPS to give an extra layer of security to their website. This will help your website to gain access from unreliable hidden scripts that are used to steal data from the login forum.

Even if you are not willing to switch to HTTPS, WordPress made it compulsory so that you can rank better in Google search results.

Increase your security on the WordPress Plugin

WordPress Plugin Security

1. Remove unnecessary Plugins

The worst mistake that website owners or excited entrepreneurs make is that they install too many plugins to make the website seamless and fast. But, sadly, they forget to uninstall the extra, unused plugins. What this does is open a gateway that hackers can use to breach security. If you don’t use a certain plugin, uninstall it at once. And don’t just uninstall it right away – the correct way is to deactivate the plugin and then uninstall it.

2. Update Them Regularly

One of the most convenient features of WordPress is notifying the owner when an update is due. When you do the core update of WordPress, ensure that the installed plugins are also updated accordingly. You have to do it manually, or if it seems difficult, you can then enable the auto-update feature that comes along with every plugin. 

The best advice is DON’T UPDATE IT YOURSELF. Ask a developer to do it for you. Why? Because you’ll never know if they have made customizations to the website that will be undone in case you update the plugin yourself.

3. Avoid Using Premium Plugins for FREE

There are tons of websites out there who claim to give Premium WordPress plugins for FREE. Avoid downloading plugins from those websites. Always, use WordPress's official website to download the premium version of the plugin.

Mostly, when you get a plugin from unknown plugin developers, hackers send a Trojan along with that plugin, and you really don’t want to hear what can happen next with your website.

So, make sure that you avoid downloading from illegal websites, torrents, or taking it from unverified developers.

4. Pick a strong hosting provider

Regardless of how many tips you use to secure your WordPress website; if the hosting server is not reliable, your website will always be in danger.

It is a known fact that out of 30,000 WordPress websites that are hacked daily, most of these websites share a weak hosting service provider. This means that choosing a reliable hosting server means a lot to maintain WordPress security.

For now, SiteGroundBlueHost, and HostNoc provide shared hosting with satisfactory security-driven features. But if you are willing to go for a dedicated hosting provider, that will be a wise option.

5. Safeguard the wp-config.php file

It is important to understand that the wp-config.php file contains all the necessary confidential information that a hacker needs to sweep off your website from the internet.

To add a layer of protection on your wp-config.php file, just include this code in your .htaccess file:

<Files wp-config.php>

order allow, deny

deny from all

</Files>

6. Deactivate directory listings

A wise developer will never place the index.html file in a new directory. Visitors can easily access the full directory listing from any particular directory. So, the best option is to disable directory listing access of the .htaccess file.

7. Cleverly change the directory permissions

If you are the website owner, you have the power to give or take access to directories. If you are not technically sound, it is best that you just give orders to your developer.

Ask your developer to change the directory permissions to “755” (readable by User, Group, and World, writable by User, executable by User, Group, and World). Or file permission “644” (the owner of the file has read and write access, while the group members and other users on the system only have read access).

Conclusion

You need security measures on your WordPress website. There are always going to be people seeking to inflict your business by hacking your websites. The best thing you can do is don't become a victim of a cyberattack and proactively prepare for the worst, so you know what to do if a hacker manages to make it past all of your defenses.

GDPR Affect Brands
Cyber Security Data Security

GDPR Explained What It Means for Your Brand

branex-logo Team Branex
The GDPR greatly influences the way brands manage the privacy and security of personal information, affecting all aspects from advertising approaches to day-to-day operations. However, by complying with GDPR, brands can enhance their reputation, build trust with their customers, and ensure the protection of their users' data, all while avoiding major penalties. Without consumer data, Facebook would be bereaved of its revenue model, marketing agencies would fail to calculate ROI accurately, and companies would not be able to keep tabs on their customers! However, here’s the catch, this corporate ownership of personal data has sown the seeds of misgivings between consumers and companies for decades, making concerns about security and privacy prevalent. Do you want to know what Google knows about you? Go to history.google.com and you’ll see how much Google knows about you. Yes, you can surely delete your activity and feel safe, but in reality, even when you delete your history, Google still stores your history on its server. Hold your horses – after the stillness and serenity of 20 years, the most important change in the history of data privacy is about to ruffle a lot of feathers.

What is GDPR?

General Data Protection Regulation, is considered the most critical data privacy change since the year 1998. In the aftermath of the Cambridge Analytica & Facebook data scandal, sensitive personal customer information, clandestinely and slyly captured and retained by businesses, poses a significant threat to privacy. GDPR proposes a viable solution to this impasse. gdpr regulation GDPR is simply all about how consumer data should be used & protected. Adopted by the European Parliament in April 2016, it is to be fully enforced throughout EU in the May 2018. For now, GDPR will apply to everyone residing in the EU, whether they’re selling their products online or offering services to citizens who are present in the EU. GDPR is poised as a replacement for the European Union’s previous data directive, governing the usage, collection, and storage of consumer data, to grant consumers greater control and more protection over their personal data. As per the law, staggering fines – 4% of global revenues or €20 million – will be levied against organizations that do not comply with the law. Companies that have incurred data breaches due to slip-ups or those with less than stellar data protection practices are especially vulnerable to this law. While this momentous shift appears to be the cherry on top of the cake for consumers and their privacy, we wonder what it would mean for brands that have spent years fueling their entire marketing departments with hordes of consumer data. GDPR asks brands and organizations to justify 7 key areas that need to be attended to:

GDPR Asks Brands To Justify 7 Key Areas:

1. Consent

While obtaining data from the consumer, companies are not allowed to use ambiguous terms or forms to trick people into filling it out without letting them know the exact purpose of the data.

2. Breach Notification

Whenever there is a breach of consumer data, the company needs to notify the customer within 72 hours.

3. Right to Access

Whenever the company is willing to share any sort of data with a third party, it cannot do so without informing the user. Also, the data provider is required to send a personal data electronic copy to the consumer for free.

4. Deletion of Old Data

When the data of the consumer is no longer relevant or outdated, the consumer has the right to ask data controllers to erase the data.

5. Data Portability

Consumers are allowed to use their private data on various platforms without going through any hassle.

6. Privacy by Design

Companies are forced to create intelligent systems to protect the data privacy of their consumers.

7. Data Defense Officers

Professionally trained people must be selected by public authorities for systematic monitoring and handling of personal data.

Will GDPR Affect Marketing?

In the first phase, the GDPR law will only affect brands and businesses that are located in the EU. All marketers need to be aware of GDPR requirements. How data will be collected, processed, and deleted.

gdpr regulation are you ready?

1. Collecting Data

The core reason to implement GDPR is to maintain transparency between consumers and companies when it comes down to personal data. In this age, consumers want to know how, when, and where their personal data is being used, collected, and stored. A good thing about GDPR is that it will empower consumers to ask companies for the collection and usage of their personal data. The GDPR enforces companies to notify consumers whenever they plan to use their data anywhere on the internet. GDPR is not willing to opt out of consent to collect data by default. This means that whenever a user opens an account, makes a transaction, or even signs up for a newsletter, just ticking the box to collect all the data won’t fit the bill. Now, consumers will be allowed to decide whether to share, track and even use their personal data. This means that marketers will face a tough decision and will be required to come up with creative ways for consumers to opt-in for the things that they prefer and the data they are willing to share with the world.

2. Data Has Already Been Collected

The rules set by GDPR not only apply to data that will be collected after the law has been implemented in place, in fact, any previously collected data will also follow the same rules laid down by GDPR. So, in order to get maximum gain and user consent, companies need to meet the requirements set by the GDPR.

3. Processing Data

Once consumer consent has been acquired, is it of vital importance to use the data for that purpose only. If you try to share the data with any third-party software or anywhere else without obtaining permission from the consumer, you’ll face serious consequences. For instance, if the consumer has subscribed to receive an email newsletter, you can only do that. If you take that data to analyze the activity on your website, you’ll face serious penalties. Another important thing to remember while collecting data from the consumer is to ensure safe and secure storage of that data. This means storing data in a way which cannot be stolen, lost, or even compromised. If companies are keen on storing data, they are bound to use hardcore encryption methods which will keep the data safe from unauthorized access. Furthermore, this data is strictly for the purpose for which it was collected in the first place. For instance, the encrypted data cannot be accessed by any marketer to analyze the buying pattern of the consumer.

4. Deleting Data

On a final note, GDPR will govern how companies will forego data once a relationship has been established between the consumer and the company. To help secure the data, companies must devise a plan to delete the consumer data as soon as the purpose has been met. As mentioned earlier, GDPR will only allow the data to be re-used after the consent of the consumer. For using data other than the purpose defined, the company is required to take permission from the consumer. Similarly, if the consumer asks for a data update, the company is liable to respond to the request within a 30-day time frame. Any delay and the company will have to face a penalty.

The New Bond Between the Brand and the Consumer

Because the new policy entails a systemic tweak in how companies retain and collect consumer information, marketers and brands will be on the hook for every data retention, deletion, and collection decision they make. This will translate into a surprising level of transparency on the consumer side unheard of since the dawn of digital marketing. This also signifies that internal policies and processes will need to be redesigned and rethought in order to be compliant. In the end, GDPR is not all horns and fangs, it is about maintaining a transparent bond between the consumer and the brand. Businesses that are operating in the EU can surely read the rules that are set by GDPR and demonstrate that they agree to the terms and regulations. To wrap things up. GDPR is all about encouraging transparency & protecting the rights of EU individuals. Businesses that are willing to follow the rules set by GDPR will be able to create long-lasting relationships with their consumers. As a custom website development company, we have already taken the necessary measures to meet GDPR regulations. Furthermore, we guarantee our visitors and customers that the data we store is solely to sell services which customers need. We don’t sell or share any data with third-party websites or apps.
Facebook Massive Failure To Keep Data Secure
Data Security

Facebook’s Data Breach A Major Setback in User Privacy

branex-logo Team Branex
As the adage goes, some people are born to fight battles until the very end. The case is pretty much similar to the infamous CEO of Facebook, Mr. Mark Zuckerberg. Not too long ago, he found himself fighting it out tooth and nail on the battlefield against the charges filed by the Winklevoss brothers and his best friend on the ownership rights of Facebook, resulting in him conceding to share his company’s profits with Eduardo, his best friend. A few years down the road, he finds himself unceremoniously chucked back into the spotlight, facing federal lawsuits and public discretion. All thanks to the massive data leak which happened in the year 2014! Sources explain that the real culprit in the matter was none other than the renowned political consulting firm Cambridge Analytica, which heartily contributed during the 2016 elections as the engine behind Trump’s advertising and promotional campaigns. The massive data leak by Cambridge occurred because the organization paid a handsome sum to a psychology professor, Aleksandr Kogan, who created a quiz application for Facebook which later became the source of harvesting information. Sadly, more than 50 million individuals fell prey to the hands of technology inadvertently. In the aftermath of the event, a question still lingers on the lips of all and sundry: who is to be blamed? People are now losing faith in sharing their personal information or accessing applications through Facebook’s social media platform any longer. In the wake of the earth-shattering scandal, only 41% of Americans still trust Facebook to conform to laws that safeguard their personal information. Surprisingly, even the remarkable entrepreneur Elon Musk of Tesla and SpaceX has taken the bold step of removing his business bidding from the platform. His most recent tweet shows that he has deleted all his business pages from the platform, which could be a massive blow to the platform. Facebook Social Media Platform The platform which was once blatantly trusted by diverse audiences around the world, has its credibility now hanging loose from a frayed thread. Mark stands firm with the statement that despite getting the British political consultancy firm, Cambridge Analytica, to certify that they had removed the information in the year 2015. The organization still managed a breach of trust misconduct with the latest updates rolling in. According to mammoth sources, such as the Guardian, Washington Post & NYTimes, a copy of the data was secured by Cambridge Analytica until the Presidential elections of 2016.

In a Statement Issued By Mark

"This was a breach of trust between Kogan, Cambridge Analytica, and Facebook. But it was also a breach of trust between Facebook and the people who share their data with us and expect us to protect it." Mark Zuckerberg at Facebook As a result, the British members of the Parliament are fueled up, and find it a reasonable enough pretext to invite Mark on a personal visit to the UK. To hear his side of why he provided misleading information on the international platforms. Mark wishes nothing but to hold back on his claims and is more than willing to answer all accusations so that the burgeoning controversy vilifying his name can be cleared. The cases against the CEO were filed by the British government on the 20th March of 2018, which sent the platform's integrity plummeting steeply. Predictions are also running berserk that this is just the beginning of an erupting volcano, as Facebook will once again face a series of file suits.

Seems Like Mark Zuckerberg is in the Line of Fire, Yet Again!

Cambridge Analytica is believed to be the mastermind behind the bewildering success of Trump in the 2016 US presidential elections. It is one of the many reasons why this data breach has become all that anybody can talk about since it could have caused a ripple that could storm over the entire country in its waves. Audiences are now wondering whether their leaked information could have paved the way for the good-for-nothing President Trump of the United States! With the diabolical news creating embarrassing debacles among the general population. British officers conducted a raid at Cambridge Analytica’s London office, their headquarters. In a statement issued on Friday, last week, "We are pleased with the decision of the Judge, and the warrant is now being executed. This is just one part of a larger investigation into the use of personal data and analytics for political purposes. As you will expect, we will now need to collect, assess, and consider the evidence before coming to any conclusions.” ICO Headquarter In their defense, the current acting CEO of Cambridge Analytica, Alexander Tayler explains to the authorities that they are not to be blamed as they have done nothing wrong. In fact, he goes so far as to claim, "We did not use any GSR data in the work we did in the 2016 US presidential election. We thought that the data had been obtained in line with Facebook’s terms of service and data protection laws." According to Alexander, Christopher Wylie, the man who released the information to the digital media was a freelance contracted employee who had worked with the firm for a short period of time. He was not drilled in the work practices deployed at the organization and was restrained because he was stealing information from the company to initiate his own firm. Facebook completely denies Alexander’s statement by putting forward a mandated rule which was passed in 2014, stating that no third party app using the Facebook platform is allowed to harvest any personal information from customers. However, the question still makes us ponder - who is to be blamed? Is the embattled CEO of Facebook Mark Zuckerberg guilty of having a loophole in the security implemented within his platform, which led to this massive breach of information? Or does the fault lie with Cambridge Analytica firm for beholding information which was meant to be dissolved in mutual agreement with Facebook? One way or another, Facebook lost its credibility among audiences worldwide, a blow for which Mark Zuckerberg had personally apologized. Credibility Among Audiences Worldwide Don’t worry Mark, the North remembers!
Ransomware Attacks on SMBs
Cyber Security Data Security

Ransomware Attacks: Why Data Backup is Must For Small and Medium-Sized Business

branex-logo Team Branex
In the wake of recent “WannaCry” Ransomware attacks, hundreds of thousands of computer systems have been affected around the world. This has raised one important question: “Are our data backup systems enough to ensure data security, privacy, and integrity?” Of course, large corporations already have disaster recovery systems in place to ensure data security, but are small and medium-sized businesses ready to cope with such disasters? There are many ways which cyber attackers employ to infect the systems. The two types which were evident in the WannaCry debacle were the use of phishing emails and a faulty security patch for Windows XP. This is just one of the many threats that SMBs face as most of their data is not on the cloud or redundant backups because of cost constraints. WannaCry ransomware, now, has infected over 230,000 computers worldwide. It affected big conglomerates like Telefonica and FedEx. In Britain, the virus has wreaked havoc in the National Health Services network disrupting surgical procedures. The scale at which this attack was carried out is unprecedented in the history of cyber-attacks, as described by Europol. WannaCry Ransomware Attacks A backup plan can save you, small business owners, from lots of adverse scenarios. However, according to the latest report based on a survey by CloudBerry Lab, a whopping 49% of Internet users don’t do any type of data backup. However, 11% more business users than individuals have implemented automated backup systems and 20% more business users perform daily backups. These are very depressing stats, to say the least, as businesses seem to be doing much less than what they should be doing in this regard.

Frequent

The frequency of data backup should be uniform as setting up an ongoing backup plan for small and medium businesses ensures they always have the latest copy of the files available in case things go south.

Easy & Simple

In ancient history, backing up your data was a complex process as not everyone was able to conduct the process totally on his own. It required copying data to tapes and later tapes were replaced by diskettes. Now you don’t have to fret a lot as there are quite a few companies that offer cost-effective backup services. So, business owners have no valid excuse now for not going for data backup.

Off-Site

The process of data backup won’t have far-reaching consequences if at least one of the copies is not stored off-site. The cloud-based backup comes into play here. In this way, a business owner can be spared from taking the external hard drive with them all the time. In using a cloud-based data backup, it can be remotely stored anywhere across the globe. As a business owner, you can also have the luxury of choosing that location. It is a good ploy to save the data to a different region or country because in case a disaster happens or war begins, you can easily retrieve the data from that unaffected region rather than choosing your same city or region.

Secure

Cloud-based backup services offer greater security than backing up data onto your servers. It doesn’t mean, however, that cloud backup is foolproof. Choosing a business-class solution for greater security is a good bet rather than a consumer backup or free service. This aspect, however, depends on the funds that you’ve allocated for backing up mission-critical data. So, choose a data backup solution that fits your budget. Data Backup Solution There can be specific industry security standards, like HIPAA regulations, that some businesses require. If your venture also falls in the same category, be sure to ask your service provider to offer you that level of security.

Swift Recovery

The last factor is about how quickly you can retrieve the data, that is, how quickly you can access your backup when you really need it the most. Some services allow you to get it quickly, while others may require a 24-hour turnaround time. Even a few hours can be too long in some cases, so you need to check this aspect too before finalizing the cloud-based data backup service. The quicker the recovery is, the more it’s going to cost you. But it’s always good to invest in this to protect yourself against ransomware attacks similar to WannaCry that we’re witnessing these days.

Final Word

You need to assess all your requirements before finalizing your data backup plan. Hackers are always altering their techniques to defeat anti-viruses and firewalls by exploiting the system’s vulnerabilities, so protecting against ransomware can be difficult for small businesses. Therefore, going for professional help is always the best option. But if you feel you can handle it yourself, then installing robust antivirus programs, firewalls (both software and hardware), and implementing strong data backup plans can help minimize the severity of such attacks.
whatsapp