Learn how to avoid the “ghost touch” scam

The phantom scam has already claimed victims across the country.

It begins with a fake call, continues with a link to install an app, and ends when the victim taps their card to their cell phone. From there, criminals can clone the data and use it for remote purchases.

In this report, our director Marcelo Nagy explains why this scam is so difficult to detect, how criminals test vulnerabilities with small charges, and what companies can do to respond once the incident has already occurred.

📖 See the full article with Marcelo Nagy:

Leading company in information security. The digital protection of your company is our priority. We rely on state-of-the-art technology used by highly specialized professionals.

(11) 2666-3787
R. São Bento, 365 – 8o Andar – Centro Histórico de São Paulo, São Paulo – SP,
CNPJ: 05.089.825/0001-48.

Copyright ©️ 2023 – All rights reserved. Check out our  Privacy Policy.