MUO

Phishing

Page 4

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
foot print in snow 1
What Is Snowshoeing and Is It Dangerous?

This is a technique used by cybercriminals to scam you via your emails. So what is snowshoeing? How does it actually work?

By 
red and blue digital lock graphic 1
The 7 Most Common Causes of Data Breaches

Someone can hack a server, but there are much easier ways to gain access to the same information. Here's what to look out for to keep your data safe.

By 
person being scammed by criminal via laptop 1
What Is Consent Phishing and Why Is It Dangerous?

Through this smart phishing scam, cybercriminals gain access to data found on cloud storage apps. So how does consent phishing work?

By 
swap a sim laptop apple macs 1
What Is SIM Jacking and What Can You Do to Protect Yourself?

This scary scam can lead to identity theft, and you might not even know it's happening to you. Here's what you need to know.

By 
phishing hook stealing credit card via cookie 1
What Is an Adversary-in-the-Middle Phishing Attack?

AiTM scams can even bypass security precautions like two-factor authentication. So how do these phishing variations work? How can you stay safe?

By 
microsoft-exchange-1 1
Hackers Take Over Microsoft Exchange Servers with OAuth Apps

Malicious attackers are using rogue OAuth apps to gain control of Microsoft Exchange servers and spread spam.

By 
working on numerous screens 1
What Cyberattacks Do Businesses Commonly Face?

It doesn't matter what size your business is: every company can face cyberattacks. So what threats are there? And what can you do?

By 
coin-base-alert 1
Have You Been Hit by the Coinbase Email Scam?

Do you invest in cryptocurrency? You're a big target for cybercriminals. So what is the Coinbase phishing scam? What should you look out for?

By 
QR Stickers on a Metal Pole 1
What Is QRishing and How Can You Avoid It?

Do you scan every QR code you see? This clever phishing scam might make you think twice...

By 
Hacker at a desk laptop 1
How Hackers Targeted Politicians With a Fake News Site

Hackers used a tried-and-tested phishing scam to deploy malware. So who was targeted? By who? And what did they actually do?

By 
rup-phishing 1
Malicious Android Apps, Cast to Xbox One, You've Been Caught in a Phishing Scam, and Raspberry Pi Projects for Beginners

Our weekly tech podcast for technophobes features security news that affects the devices you use, as well as tips to make better use of your tech.

By 
An image of a cybersquatter on a laptop 1
What Is Cybersquatting and How Can You Prevent It?

Also known as domain squatting, cybersquatting can be both annoying and costly. Here's what it means for you and your business.

By 
login details stolen by phishing hook on laptop 1
New "Ducktail" Phishing Campaign Targets Facebook Business Accounts via LinkedIn

Employees managing Facebook Business accounts are now being targeted via LinkedIn in a spear phishing campaign known as "Ducktail".

By 
phishing hook stealing email on laptop  1
The Top 7 Signs of a Phishing Scam

How do you spot a phishing email? What if a scam message comes through via social media? Here are some tell-tale red flags.

By 
office 365 menu behind alert logo 1
Microsoft Warns of AiTM Phishing Attacks Affecting Over 10,000 Organizations

Microsoft is warning users of a large-scale AiTM phishing campaign that has targeted tens of thousands of organizations since September 2021.

By 
@ symbol 1
What Is Vendor Email Compromise and How Can You Protect Against It?

Everyone should know about this variation of a typical phishing scam—which can lose you money and damage your reputation.

By 
person using phishing hook on man using laptop 1
What Is Double Barrel Phishing and Is It Dangerous?

Most people are aware of phishing scams. That's why cybercriminals are increasingly moving onto double barrel phishing. Here's what you need to know.

By 
Photo of someone using Facebook on their laptop 1
8 Tips to Avoid Phishing Scams on Facebook

Phishing scams are rife on Facebook. But thankfully, there are ways to avoid becoming a victim of one...

By 
bitb attack (1) 1
What Is a Browser-in-the-Browser Attack and How Can You Protect Yourself?

A clever phishing tactic steals your login credentials when you sign in using associated accounts like Google and Facebook. Here's how.

By 
emails leaving laptop with hazard logos 1
What Is Clone Phishing?

A lot of people are aware of phishing but don't know all the variations of it. So here's what you need to know about clone phishing.

By 
2 3 4 5 6
Page 4 / 9