Phishing

Phishing Campaigns Use COVID-19 and FedEx, DHL, and UPS Fake Issues to Spread Malware screenshot

Phishing Campaigns Use COVID-19 and FedEx, DHL, and UPS Fake Issues to Spread Malware

We are living through a pandemic. Coronavirus, or more precisely COVID-19, has gripped the world and caused ripples globally. People get encouraged to stay home and implement social distancing in their daily routines.... Read more

May 11, 2020
Students of an Ivy League University Are Bombarded with Fake Job Offers via Phishing Emails screenshot

Students of an Ivy League University Are Bombarded with Fake Job Offers via Phishing Emails

Are you a Dartmouth student? Are you ready to start a career linked to your degree? If you are, you need to look out for phishing emails that might offer high-paying jobs. It is possible that the schemers behind these... Read more

December 6, 2019
Top Scams of 2019 and How They Can Put Your Virtual Security at Risk screenshot

Top Scams of 2019 and How They Can Put Your Virtual Security at Risk

We have talked about some of the biggest online scams that tricked multiple people out there before, but it is time we update that information. Although we're not even halfway through 2019 yet, the cybersecurity... Read more

May 13, 2019
7 Most Important Online Security Practices Everyone Should Follow screenshot

7 Most Important Online Security Practices Everyone Should Follow

There were close to 4,200,000,000 active Internet users by the end of 2017, according to the statistics provided by internetworldstats.com, and this number is likely to increase by the end of 2018. With more than half... Read more

August 22, 2018
Spearphishing Campaign Takes Advantage of Coronavirus Fears to Spread Lokibot Infostealer screenshot

Spearphishing Campaign Takes Advantage of Coronavirus Fears to Spread Lokibot Infostealer

Coronavirus-related cybercrime has skyrocketed in the past few months. Malicious individuals forsake human decency and take advantage of the panicked state of the world, and the constant need for information. Cyber... Read more

April 21, 2020
Attention: Schemers Use the Accounts of Your LinkedIn Contacts to Send You Phishing Messages screenshot

Attention: Schemers Use the Accounts of Your LinkedIn Contacts to Send You Phishing Messages

You probably already know that you should never interact with messages that come from unknown senders, but what do you do when someone from your contacts sends you a link or a file and asks to view it? If you want to... Read more

December 6, 2019
How to Tell If a Website Is Safe screenshot

How to Tell If a Website Is Safe

We've come to accept that certain images and symbols mean certain things. A picture of a padlock, for example, is regularly associated with security. It might seem like the most natural thing in the world, but this... Read more

April 30, 2019
Top-Clicked Phishing Report Shows How Easily Computer Users Are Scammed screenshot

Top-Clicked Phishing Report Shows How Easily Computer Users Are Scammed

Phishing shouldn't be such an effective attack in theory. When you take a closer look and consider a few things, you'll see that in a typical scenario, there are far too many easy-to-notice factors that give the... Read more

July 30, 2018
A Citibank Phishing Scam Attempts to Extract Personal Information screenshot

A Citibank Phishing Scam Attempts to Extract Personal Information

Yet another phishing scam targeting Citibank customers was doing the rounds recently. It was discovered by a researcher going by the Twitter handle MalwareHunterTeam, and other cybersecurity sources also reported on... Read more

January 24, 2020
How to Recognize and Prevent Common LinkedIn Phishing Emails screenshot

How to Recognize and Prevent Common LinkedIn Phishing Emails

Recently, we've been getting news of new LinkedIn-related phishing attacks. According to the news, the hackers use an array of assorted schemes in order to pressure their targets into visiting web pages laced with... Read more

June 20, 2019
Got $50? That's Enough to Buy Someone's Online Identity screenshot

Got $50? That's Enough to Buy Someone's Online Identity

Having your online identity compromised can bring you a lot of grief, and in some cases, financial damages. Few people think about this when they're signing up for various online services using weak passwords or when... Read more

January 17, 2019
How Identity Thieves Use Weak Passwords to Exploit Personal Information screenshot

How Identity Thieves Use Weak Passwords to Exploit Personal Information

The internet is filled with people who have bad intentions. Sometimes they only want to cause a bit of mischief, like hacking your facebook and texting the girls in your friend list for naughty pics. Other times they... Read more

July 16, 2018
Loading...