As Tax Identity Theft Awareness Week in the US gets underway, ESET's Stephen Cobb offers expert advice on how to protect yourself from fraudsters.
Search results for: "Scams"
Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little is known about this tactic. This feature discusses some key aspects.
Online gaming and cybercrime are more connected than you might think. We explore how online games are becoming the new hunting ground for cybercriminals looking to earn and learn.
It’s that time of the year when the information security industry takes part in its annual tradition: coming up with cybercrime predictions and trends for the next 12 months.
Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.
Black Friday and Cyber Monday promise to offer some fantastic deals at low prices. But it’s also a time of year when cybercriminal scams are aplenty. Here’s what you should do to do to shop safely.
The free version of Ammyy's remote administrator software were being served a bundle that contained an NSIS installer used by the gang behind Operation Buhtrap.
The cost of last month’s cyberattack on TalkTalk is likely to top £35 million, the company’s CEO, Dido Harding, has admitted in an interview.
Welcome to our new weekly round-up, offering you a recap of the biggest stories, opinion pieces and reports from the world of information security from the past seven days.
The world wide web has made shopping an altogether more pleasant, cost-effective and user-friendly experience. However, buying online has its risks. Here are five top tips to stay safe and secure.
As part of World Post Day (October 9th), we take a closer look at the many security risks associated with email, the electronic cousin of regular mail.
IKEA, KFC, H&M and 7-Eleven are just a few popular brands that are being exploited by cybercriminals via WhatsApp. We take a closer look at this multi-country, multi-brand fraud.
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Over the last few weeks we’ve seen an increase in fake vouchers being spread via WhatsApp. This scam has all the hallmarks of a global campaign.
It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here's what you need to know.
With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT security.
Phishing may well be one of the oldest online scams in the world, but it’s also one of the most effective and commonly deployed. Here’s what to be aware of.
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
Support scammers: old twisters, new twists, and scammer psychology.