For years, cybercriminals have used social media to post fake listings for popular items such as furniture or electronics. As these scams have grown in popularity, many people have learned to be careful when buying items online
For years, cybercriminals have used social media to post fake listings for popular items such as furniture or electronics. As these scams have grown in popularity, many people have learned to be careful when buying items online
Locking your screen when you leave your desk is a simple way to keep your information secure and is often overlooked. Keeping your screen unlocked can be dangerous for a number of reasons. Many computers are set
The social media app TikTok is popular for its creative audio and visual filters. TikTok adds and removes filters frequently, so some users may look for ways to access filters that haven't been added. Now, cybercriminals are
If you’ve taken security awareness training, you have probably been taught to hover your cursor over a link to view the destination URL. Checking the URL for things like misspellings, unofficial domain names, and sneaky subdomains is
You may be wondering what homoglyphs and Unicodes are. Homoglyphs are letters or characters that look similar. For example, the character “e” looks similar to the character “ė”. Unicode is a unique code assigned to characters so
New innovations in technology are being developed at a rapid rate. But new technology comes with new risks. Let's go over some examples of how technology will change in the future and ways you can stay safe.
Organizations often use email to send important information to their customers. If an organization sends out an email that’s missing information, they may send you a follow-up email. Now, cybercriminals are using a technique called “clone phishing”
Getting ready for a vacation? If you plan to use a popular vacation rental website or application (app), such as AirBnB, HomeAway, or VRBO to find your next getaway, beware. Cybercriminals are using these services to trick
Cryptocurrency exchanges are platforms that allow you to buy and sell cryptocurrencies, such as Bitcoin. When you buy cryptocurrency, it’s stored in a digital wallet. Most cryptocurrency exchanges require that you use an additional authentication method, such
Be on the lookout for all incoming communications, such as text messages, voice messages, and emails, as this is where you will find most scams. The top scams to watch out for this holiday season: Smishing (fake