Here’s a popular phishing scenario: You receive an email with a link. The link takes you to a phony login page with...

Here’s a popular phishing scenario: You receive an email with a link. The link takes you to a phony login page with...
It’s no secret that cybercriminals love social media. Bad guys use platforms like Facebook and Instagram to...
Scammers can threaten you with everything from shutting off power to your home to legal action. Don’t fall victim to...
For most of us, the holiday season is about friends, family, food—and shopping! Black Friday and Cyber Monday fall just after Thanksgiving in the U.S., but internationally, they are two of the busiest shopping days of the year. Unfortunately, while you’re looking for...
Many services, from grocery pickup to credit score updates, offer notifications via text messages or short message service (SMS). Typically, these notifications are short, vague, and include a link—which makes them great for spoofing! Bad guys use fake notification...
Working with a third-party organization can be a great help, but what happens if that third party falls victim to a cybersecurity attack? Not only could your organization’s shared data be exposed, but you may become the target of a very unique phishing...
Voice phishing, or “Vishing”, is a phishing attack conducted by phone. This is a classic tactic that bad guys typically use to collect your credit card or financial data, along with other personal information. Here’s an example: You receive a call from someone...
Some retailers use online surveys to learn more about their customers. Completed surveys are often rewarded with small consolations, like a coupon. Sounds fun, right? The bad guys sure think so! Scammers are posing as well-known brands and sending emails that...