Make your digital world more secure.

Are you concerned about falling victim to online frauds and scams from Phishing emails, dangerous websites or other cybercrimes?

Cyber Ollie

ScamBLOX© Plus

ScamBLOX© Plus – CyberAI’s premiere software solution improves browser security reducing the risks of falling victim to harmful online frauds and scams on all of your computing devices. This enables users to check emails and surf the web with greater safety and peace of mind. 

Protecting you through

Website Trust Score Report...

3 Levels of Protection

Embracing Community Engagement

Phishing Email Alerts

Socializing Safety

Previous slide
Next slide

ScamBLOX© Services

ScamBLOX© Plus

BUY ScamBLOX© Plus now for no more than $4.99/month! Check out our multiple pricing plans.

Our Partners

CyberAI, through its ScamBLOX products, is building relationships with all levels of law enforcement and other government agencies. 

We welcome the opportunity to network and collaborate with like-minded associations, public and private groups, and advocates who seriously consider the global impact of cyber crimes on our society.

What our customers say about us

4.8/5

20+ reviews

ScamBLOX© Plus

ScamBLOX© Plus – CyberAI’s premiere software solution improves browser security reducing the risks of falling victim to harmful online frauds and scams on all of your computing devices. This enables users to check emails and surf the web with greater safety and peace of mind.

Use a real time, multi-layered targeted security approach to maximize your protection, aka

Connect to five of the top global databases tracking millions of dangerous websites and cybercriminals. Enable our unique methods to detect and identify new frauds and scams before they take hold and become destructive, impacting the public in harmful ways. These filter on content contained in our Website Trust Score report such as domain age, popularity, etc.

Enhance your browser security by combining these processes. Reduce yours and your family’s risk of falling victim to online frauds and scams through an improved proactive identification of cybercriminals, anytime you access the web. Get ScamBLOX© Plus NOW!

Trustscore

Domain: dropbox.com

Established: 1995-06-28

Server IP Address: 205.251.193.59

Domain Blacklisted: No

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that blocks all malicious elements (email addresses, websites users, …)

Suspended Site: No

When your website account is suspended, it means the hosting provider has temporarily taken it offline. Website hosts often suspend websites for a myriad of reasons ranging from malware to spam.

Email (MX) Configured: Yes

Verification that the website has its entity’s proper IMAP (Inbox) and SMTP (Outbox) mailbox servers configured correctly.

DMARC Configured: Yes

DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC), and other email-based attacks.

SSL Cert Blacklisted: No

Hackers have discovered ways to circumvent, alter, or abuse SSL certificates. An SSL certificate blacklist is a list of untrustworthy SSL certificates that have been created and can potentially harm users.

Website Popular: No

Risky TLD: No

The TLD (Top Level Domain) are the last characters of an entity’s website name, such as .com, .org, etc. Cyber-criminals and threat actors prefer a small set of 25 out of the thousands of available extensions, which accounts for 90% of all malicious sites. A Risky TLD is verification that the domain name is not to be trusted.

Heuristic Pattern: No

If a website uses Heuristics, then it is a scanning method that looks for malware-like behavior patterns. It is commonly used to detect new or not-yet-known malware.

Risky Geolocation: No

Verification to an entity’s geolocation status being labeled as ‘Risky’.

Suspicious Domain: No

Verification the entity’s domain is not listed as being “Suspicious”.

3 Levels of Protection

When signing up for a new account, the user provides a unique email used to authenticate and authorize all 3 levels of protection functionality within the extension. The user can manually select which level of protection is desired by clicking on the bottom button of the WTS report. The extension displays the webpage view with the 3 levels of protection plus statistics on how many webpages were identified in the last 7 days:

The following is a breakdown of the levels of protection: 

Level 0 (WTS = 0):

Level 25 (0 > WTS < = 25): 

Level 50 (25 > WTS < = 50):

Additional Support Available

Our Consumer and Business forums provide input and engagement from our user community to discuss trends and solutions concerning frauds and scams. 

These innovative discussions reduce your online risk profile against frauds and scamming activities experienced within your internet browsing for activities such as: 

  • Crypto currency and investment 
  • Social Media 
  • Insurance 
  • E – commerce 
  • Career recruitment 
  • Romance 
  • And much more! 

What are frauds and scams [Phishing] in an Email, text messaging, or phone call?

Cybercriminals use frauds and scams in email content [Phishing] as attack techniques. These methods try to steal your money, or your identity, by getting you to reveal personal information such as credit card numbers, bank information, or passwords on websites that pretend to be legitimate. Criminals use social-engineered scams through emails, text messaging or phone calls.

Tips on how to identify Phishing frauds and scamming emails, text messaging, or phone calls:

• Emails, text messaging, or phone calls demanding urgent action
• Emails or text messaging with bad grammar and spelling mistakes
• Emails, text messaging, or phone calls with an unfamiliar greeting or salutation
• Emails, text messaging, or phone calls with inconsistencies in email addresses, links, and domain names
• Emails or text messaging contain or include suspicious attachments
• Emails, text messaging, or phone calls requesting login credentials, payment information or sensitive data about you.
• Emails or text messages which attach an invoice for payment.
• Emails, text messaging, or phone calls which sound too good to be true

Defense in Depth

Defense in Depth (DiD), also known as the Medieval Castle Defense, is a popular security program approach which occurs throughout the centuries. Through the use of our real time, multi-layered targeted security approach, we reduce your risk of online frauds and scams. Think of our strategies as what one uses to defend a medieval castle.

The Medieval Castle Defense uses things like a moat to encircle the castle with water. This creates for the need of a drawbridge to be lowered in order to cross over the moat.  Having an iron gate which when lowered successfully blocks the castle side of the drawbridge from entry. Then there are the high walls, windows, parapets and ramparts from which archers launch arrows, soldiers pour hot oil and other defenses from. Put them all together and you have a valuable multi-layered, targeted security approach which is stronger when combining these strategies versus having only a single one.