As the teams prepare to battle it out on the gridiron, fraudsters are waiting to intercept your funds
Search results for: "Scams"
Cybercriminals are putting a new twist on an old trick
Black Friday and Cyber Monday are just around the corner and scammers are gearing up to flood you with bogus offers
Up to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules
ESET researchers discover fraudulent schemes piggybacking on the popularity of the face-modifying tool FaceApp, using a fake “Pro” version of the application as a lure
Roses are red, violets are blue, watch out for these scams or it may happen to you
What are the emotional triggers and errors in judgment that make you fall victim to scammers?
The international effort to disrupt Business Email Compromise (BEC) schemes also resulted in the seizure of nearly $2.4 million and the recovery of around $14 million in fraudulent wire transfers
Whether travelling to enjoy the matches in person, or watching from home, fans should be on the lookout for foul play
In 2017, the victims of BEC fraud were stung for $676 million, almost double the loss totals reported in the previous year
The importance of providing the best possible after-sales service to customers
Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.
In 2017, cryptocurrencies became a booming industry, attracting the attention of not only new users, but also cybercriminals. As the fraudsters came rushing to the newly crowded cryptocurrency space, users, businesses, and exchanges have found themselves the target of various fraud schemes – from phishing scams, through hacks, to surreptitious crypto-mining on compromised devices and,
The recent rise in cryptocurrency scams appearing on the Android platform in disguise has shown that such incidents are not exclusive to PCs and also highlight the importance of knowing what to look out for so you do not unintentionally take part.
Another template attempts to scare, rather than thrill, the recipients. Upon learning that “your IP address and other identifying information were used to commit multiple online crimes”, the mark is urged to contact the sender by phone immediately.
Merciless scammers have no qualms about exploiting people's kind-hearted nature by spreading their attacks via social networks and email, linking to counterfeit charity websites designed to steal the public's payment card details.
David Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.
If you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley.
Microsoft takes a shot at preventing support scammers from exploiting Bing Ads, explains David Harley, senior research fellow at ESET.
Welcome to this week’s security review, which includes an in-depth look at how the ransomware dubbed Locky is infiltrating computer systems.