Our Reviews

WizCase includes reviews written by our experts. They evaluate the products/services in accordance with their professional standards.


Kape Technologies PLC, the parent company of Wizcase, owns ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

Referral fees

Wizcase may earn an affiliate commission when a purchase is made using our links. However, this has no influence on the content of the reviews we publish or on the products/services reviewed. Our content may include direct links to buy products that are part of affiliate programs.

Reviews standards

The reviews published on Wizcase are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may take into consideration the affiliate commissions we earn for purchases through links on our website.

How VPNs Fight Phishing Scams and Other Cybercrime

Shelby Taylor
Last Updated by Shelby Taylor on June 20, 2022

In August of 2017, Brazilian finance workers found themselves under siege by a sophisticated, multi-layered attack by scammers in the country.

By targeting potential victims on social media, the scammers were able to pinpoint people whose jobs include dealing with a company’s finances. They were able to capture these employees’ work credentials like phone numbers and call them with an urgent, phony message that they needed to install an update into their bank’s security module.

The update was no such thing, but rather malware posing as an extension of Google Chrome. This malware’s purpose, not surprisingly, is to target banking credentials and send them back to a remote location. Every person that fell for the phishing scam immediately logged into their bank’s infrastructure via their own credentials, which were quickly captured by the malware.

Malware detection

Most companies have malware detection systems in place to combat such attacks, but this one was different. The code was written atypical of normal malware in order to avoid detection, according to a blog written by Morpheus Labs’ Renato Marinho.

Adding the phone call to the plan further legitimizes the entire operation to targeted victims. By mapping companies using the likes of Facebook, Twitter, and LinkedIn, the cybercriminals already have an enormous leg up, able to contact targets with full knowledge of their names, job titles, and places of business.

If the target engages in the phone call, the cybercriminal will proceed to walk them through the steps of the download and then have them “test” the company’s bank account.

Once the victim has followed the guidelines and installed the fake module, the fraudster guides the victim to a test access to the company’s bank account,” Marinho said. “It is at this moment that the information is stolen.”

Battling phishing scams

Phishing scams range from simple and stupid to complex and hard to root out, as the Brazilian financial workers found out first hand in 2017. No matter what industry you work in or whether you’re the CEO or work in the mail room, there are plenty of ways to keep safe from phishing at your home or office.

  • Think Before You Click:
    Does this make sense?” is a question we should all ask ourselves before we make any decision online, particularly when it pertains to releasing our personal data or financial information. Legitimate companies have painstaking systems in place to collect our information, with multiple screens full of warnings and legal notices. Phishing attacks usually have none of these things in place and are all too quick to get you to the pages where you start giving your vital information away.
  • Voice Verification:
    When someone calls you from the “payment department of your credit card company,” a huge red flag should fly up in your face. Usually scammers will give as little detail about themselves as possible, instead trying to instill a sense of urgency into you agreeing that action must be taken and ushering you along to the decision they want you to make. If you’re unsure, ask for a call back number or tell them you need to get your supervisor. If they hang up, your suspicions are confirmed.
  • Verify Website Security:
    This is one of the easiest to do and one of the easiest to overlook. If a website is properly secure, it will have an ‘s’ after the http and there will be a secured lock icon. If either or neither of these exists, you need to get out of there before you get scammed.

Using VPNs to combat cybercrime

Using a virtual private network (VPN)  is for far more than working around blocks on Netflix or Facebook. A secure VPN connection can keep your information safe when you are performing online bank transactions, sending private emails, or using wireless networks that are not secured.

Even if hackers are capable of seeing where you are going online, they won’t be able to harness all the power of the connection because of the encryption involved. When you start a VPN connection, you send information and requests to the Internet via an indirect route. Whatever you enter to go online is encrypted and sent to the remote server through a shielded tunnel. The remote server decrypts the information and attaches a different IP address to it before sending it on to the Internet without a single shred of your personal ID attached to it. When information comes back your way from the Internet, it goes first to the remote server, then to you through the same encrypted method.

Three VPN services that provide great security means are NordVPN, Private VPN, and Trust.Zone.


Screenshot of TrustZone's homepage

Trust.Zone has a zero logging policy and unlimited speed and bandwidth.

Get it Now

2Private VPN

Private VPN excels with an automatic kill switch and in-built leak protection.

Get it Now



NordVPN has 24/7 customer support with real people for getting yourself unstuck from key situations.

Get it Now

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!
4.10 Voted by 2 users
Thanks for your feedback
Shelby Taylor
Shelby is an enthusiastic world traveler. While she holds a degree in Physics and Astronomy with an emphasis in Astrophysics/minor in mathematics - she has found a new passion in the world of cybersecurity, online freedom, and marketing in the tech industry.