MUO

Phishing

Page 6

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
sugardaddy 1
We Responded to a Sugar Daddy So You Don’t Have To

What happens when you respond to sugar daddy scam requests? We found out. Don't try this at home.

By 
Photo of an email inbox on an iPhone 1
What Is a DMARC and How Does It Help Prevent Email Spoofing?

If you have an email domain and want to protect it from spoofing, getting a DMARC can help. Here's how.

By 
 1
What Happened When We Responded to a Phishing Email?

We responded to a phishing email, so you don't have to. Here's what happened.

By 
angler phishing attempt 1
What Is Angler Phishing and How Can You Avoid Falling Victim?

Been contacted on social media by a company rep? Don't immediately trust them: it could be a angler phishing scam.

By 
Fingers typing on laptop keyboard 1
What Are Keyloggers? Five Easy Ways to Protect Against Them

A grave threat to your sensitive information, keyloggers can record every keystroke on a device.

By 
crown 1
Nigerian Prince Scams: What Are They and Why Aren't You Rich?

Got an email offering you thousands or millions of dollars as a reward for your help? Don't fall for this phishing scam.

By 
human hacking 1
Hacking Humans: 5 Ways You Can Be Exploited on Social Media

Think before you share too much information on social media: here's how cybercriminals can influence your life online.

By 
A phishing attack 1
Scammers are Abusing Microsoft and Google's Services for Phishing Attacks

Cybercriminals are snapping up convincing-looking email addresses to enhance their phishing campaigns.

By 
A hacker targeting aviation 1
The Aviation Industry Is Under Cyberattack, Says Microsoft

Scammers are sending Trojan emails en-masse to those who work in the travel industry.

By 
facebook clone scam 1
What Is a Facebook Cloning Scam?

Found another version of your Facebook? Here's what the cloning scam is, and how you can protect yourself and your friends.

By 
phone with someone's linkedin profile next to keyboard 1
500 Million Affected by LinkedIn Data-Scraping: What To Look Out For

The sale of your LinkedIn data by hackers could result in phishing scams. So what exactly should you watch out for?

By 
A scammer using Microsoft and Zoom as identities 1
Scammers Impersonated Microsoft and Zoom the Most in 2020

COVID-19 brought about a new way of working, and scammers were keen to take advantage of it.

By 
Threat Message Featured 1
5 Common Cybercrime Attack Vectors and How to Avoid Them

Cybercriminals rely on the same group of attack vectors to attempt to fool you. Learn what those vectors are and avoid them.

By 
 1
Why That Email About Your Apple ID Being Locked Is a Scam

Here are the most common signs that you're dealing with a phishing email that will steal your Apple ID and password.

By 
microsoft yubico yubikey feature 1
Yubico Donates Heaps of YubiKeys to Microsoft AccountGuard Customers

The YubiKeys will help protect against election interference.

By 
 1
Don't Be Fooled by These Advanced Phishing Techniques

Anyone can be fooled by a phishing email or website vulnerability. Watch out for these advanced phishing tricks.

By 
 1
Nearly Half of All Credential Phishing Lures Feature a Microsoft Product

It's a trusted brand name, which makes it easy to exploit.

By 
Craigslist Email Scam Featured 1
Don't Fall for This Craigslist Email Recovery Scam!

A scam on Craigslist could see you handing over your email account to thieves. Here's how it works and how to stay safe.

By 
A caught fish 1
What To Do After Falling for a Phishing Attack

You've fallen for a phishing scam. What should you do now? How can you prevent further damage?

By 
Social Engineering Explained Featured 1
What Is Social Engineering? Here's How You Could Be Hacked

Learn how social engineering can affect you, plus common examples to help you identify and stay safe from these schemes.

By 
4 5 6 7 8
Page 6 / 9