Phishing emails are a sad fact of life, and most of us are used to dealing with them - but cybercriminals are increasingly turning to SMS to reel in their victims. Our tips should help you avoid clicking something you'll regret.
Search results for: "Scams"
Spotting “bad” apps on Android is not always easy - with cybercriminals finding new tricks every month to fool phone and tablet users into downloading malware.
[A shorter version of this article was originally published – without illustrations – on the Anti-Phishing Working Group’s eCrime blog.] Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other
Blizzard, makers of the hit online game World of Warcraft, issued a security alert today after a spate of unauthorized logins and player reports of "money laundering" scams.
…and nor are we responsible for fake AV/scareware and (more recently) ransomware, though I did suggest in a paper I presented at EICAR a couple of years ago that the bad guys who do peddle that stuff are all too proficient at stealing our clothes, and that maybe some security companies were making it easier
Cybercriminals are using online car auctions and photo-sharing services to dupe victims into downloading malware, the FBI has warned. Once infected, the victims are led to fake websites to buy cars - and when they pay up, the criminals vanish.
The new ESET blog format must be striking a real chord with people. At any rate, job offers are just pouring in. Except that they don't seem to be jobs for security bloggers, or for web developers like the team that maintains this site.
If your friend said it on Social media it must be true? Not if your friend's acount has been hacked. We review tips for staying safe on social media.
Answers to common questions about tax season scams in America and advice about fending off the malicious activity that seeks to exploit tax matters.
Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we
What does the New Year hold for information security, malicious software, consumer privacy and cybercrime? Questions of this mature are posed by journalists toward the end of every year and, beginning about November, answers from security specialists start to appear in print. Indeed, ESET researchers in Latin America published a 20-page white paper on this
Tempted to invest in colour diamonds or collectible bottles of wine? That irresistible offer could be a boiler room scam.
Not all premium scam alerts are useful, but that doesn't mean that premium rate telephone scams aren't a significant problem.
Even if you really do have an infected system, it doesn't mean that anyone who rings out of the blue knows as much about you and your PC as they want you to think.
Presented at the Cybercrime Forensics Education & Training Conference in September 2012, this paper looks at the support scam problem from a forensic point of view.
Presented at the Virus Bulletin 2012 conference in September, this is a comprehensive consideration of the ongoing evolution of the PC telephone support scam. First published in Virus Bulletin 2012 Conference Proceedings*
A paper for the Cybercrime Forensics Education and Training Conference looking at forensic issues that arose during our research into Tech Support Scams.