What Is Snowshoeing and Is It Dangerous?
This is a technique used by cybercriminals to scam you via your emails. So what is snowshoeing? How does it actually work?
The 7 Most Common Causes of Data Breaches
Someone can hack a server, but there are much easier ways to gain access to the same information. Here's what to look out for to keep your data safe.
What Is Consent Phishing and Why Is It Dangerous?
Through this smart phishing scam, cybercriminals gain access to data found on cloud storage apps. So how does consent phishing work?
What Is SIM Jacking and What Can You Do to Protect Yourself?
This scary scam can lead to identity theft, and you might not even know it's happening to you. Here's what you need to know.
What Is an Adversary-in-the-Middle Phishing Attack?
AiTM scams can even bypass security precautions like two-factor authentication. So how do these phishing variations work? How can you stay safe?
Hackers Take Over Microsoft Exchange Servers with OAuth Apps
Malicious attackers are using rogue OAuth apps to gain control of Microsoft Exchange servers and spread spam.
What Cyberattacks Do Businesses Commonly Face?
It doesn't matter what size your business is: every company can face cyberattacks. So what threats are there? And what can you do?
Have You Been Hit by the Coinbase Email Scam?
Do you invest in cryptocurrency? You're a big target for cybercriminals. So what is the Coinbase phishing scam? What should you look out for?
What Is QRishing and How Can You Avoid It?
Do you scan every QR code you see? This clever phishing scam might make you think twice...
How Hackers Targeted Politicians With a Fake News Site
Hackers used a tried-and-tested phishing scam to deploy malware. So who was targeted? By who? And what did they actually do?
Malicious Android Apps, Cast to Xbox One, You've Been Caught in a Phishing Scam, and Raspberry Pi Projects for Beginners
Our weekly tech podcast for technophobes features security news that affects the devices you use, as well as tips to make better use of your tech.
What Is Cybersquatting and How Can You Prevent It?
Also known as domain squatting, cybersquatting can be both annoying and costly. Here's what it means for you and your business.
New "Ducktail" Phishing Campaign Targets Facebook Business Accounts via LinkedIn
Employees managing Facebook Business accounts are now being targeted via LinkedIn in a spear phishing campaign known as "Ducktail".
The Top 7 Signs of a Phishing Scam
How do you spot a phishing email? What if a scam message comes through via social media? Here are some tell-tale red flags.
Microsoft Warns of AiTM Phishing Attacks Affecting Over 10,000 Organizations
Microsoft is warning users of a large-scale AiTM phishing campaign that has targeted tens of thousands of organizations since September 2021.
What Is Vendor Email Compromise and How Can You Protect Against It?
Everyone should know about this variation of a typical phishing scam—which can lose you money and damage your reputation.
What Is Double Barrel Phishing and Is It Dangerous?
Most people are aware of phishing scams. That's why cybercriminals are increasingly moving onto double barrel phishing. Here's what you need to know.
8 Tips to Avoid Phishing Scams on Facebook
Phishing scams are rife on Facebook. But thankfully, there are ways to avoid becoming a victim of one...
What Is a Browser-in-the-Browser Attack and How Can You Protect Yourself?
A clever phishing tactic steals your login credentials when you sign in using associated accounts like Google and Facebook. Here's how.
What Is Clone Phishing?
A lot of people are aware of phishing but don't know all the variations of it. So here's what you need to know about clone phishing.