We Responded to a Sugar Daddy So You Don’t Have To
What happens when you respond to sugar daddy scam requests? We found out. Don't try this at home.
What Is a DMARC and How Does It Help Prevent Email Spoofing?
If you have an email domain and want to protect it from spoofing, getting a DMARC can help. Here's how.
What Happened When We Responded to a Phishing Email?
We responded to a phishing email, so you don't have to. Here's what happened.
What Is Angler Phishing and How Can You Avoid Falling Victim?
Been contacted on social media by a company rep? Don't immediately trust them: it could be a angler phishing scam.
What Are Keyloggers? Five Easy Ways to Protect Against Them
A grave threat to your sensitive information, keyloggers can record every keystroke on a device.
Nigerian Prince Scams: What Are They and Why Aren't You Rich?
Got an email offering you thousands or millions of dollars as a reward for your help? Don't fall for this phishing scam.
Hacking Humans: 5 Ways You Can Be Exploited on Social Media
Think before you share too much information on social media: here's how cybercriminals can influence your life online.
Scammers are Abusing Microsoft and Google's Services for Phishing Attacks
Cybercriminals are snapping up convincing-looking email addresses to enhance their phishing campaigns.
The Aviation Industry Is Under Cyberattack, Says Microsoft
Scammers are sending Trojan emails en-masse to those who work in the travel industry.
What Is a Facebook Cloning Scam?
Found another version of your Facebook? Here's what the cloning scam is, and how you can protect yourself and your friends.
500 Million Affected by LinkedIn Data-Scraping: What To Look Out For
The sale of your LinkedIn data by hackers could result in phishing scams. So what exactly should you watch out for?
Scammers Impersonated Microsoft and Zoom the Most in 2020
COVID-19 brought about a new way of working, and scammers were keen to take advantage of it.
5 Common Cybercrime Attack Vectors and How to Avoid Them
Cybercriminals rely on the same group of attack vectors to attempt to fool you. Learn what those vectors are and avoid them.
Why That Email About Your Apple ID Being Locked Is a Scam
Here are the most common signs that you're dealing with a phishing email that will steal your Apple ID and password.
Yubico Donates Heaps of YubiKeys to Microsoft AccountGuard Customers
The YubiKeys will help protect against election interference.
Don't Be Fooled by These Advanced Phishing Techniques
Anyone can be fooled by a phishing email or website vulnerability. Watch out for these advanced phishing tricks.
Nearly Half of All Credential Phishing Lures Feature a Microsoft Product
It's a trusted brand name, which makes it easy to exploit.
Don't Fall for This Craigslist Email Recovery Scam!
A scam on Craigslist could see you handing over your email account to thieves. Here's how it works and how to stay safe.
What To Do After Falling for a Phishing Attack
You've fallen for a phishing scam. What should you do now? How can you prevent further damage?
What Is Social Engineering? Here's How You Could Be Hacked
Learn how social engineering can affect you, plus common examples to help you identify and stay safe from these schemes.