Getting ready for a vacation? If you plan to use a popular vacation rental website or application (app), such as AirBnB, HomeAway, or VRBO to find your next getaway, beware. Cybercriminals are using these services to trick
Getting ready for a vacation? If you plan to use a popular vacation rental website or application (app), such as AirBnB, HomeAway, or VRBO to find your next getaway, beware. Cybercriminals are using these services to trick
You probably use your favorite search engine, such as Google or Bing, to find more information about topics that interest you. Have you ever stopped to think about how the top search results earned their spots? Unfortunately,
What is BEC? In a Business Email Compromise (BEC) attack, cybercriminals impersonate business professionals to trick victims into sharing information about their organization. This attack is an advanced form of spear-phishing: a phishing attack that targets a
Did you know that the average person uses the same three to seven passwords to log in to over 170 online accounts? In addition to being reused, these passwords are often weak and can be easily guessed
Data breaches are becoming more and more common these days. You hear about them in the news all the time. So you might be wondering: what exactly is a data breach? A data breach is when secure
Do you regularly use your debit card for online purchases? Do you have payment information saved on online shopping accounts? Do you use autofill to enter your payment information? If you answered yes to any of these
One of the most common and successful tricks cyber criminals use to trigger you into falling for their scams is fake “stressor events”. In this context, “stressor events”, are shocking or compromising situations that inflict fear or
What is it? Multi-factor Authentication (MFA) is the process of verifying that you are who you claim to be when logging in to a device or an account. If you're reading this from your work computer, you
Passwords have become an integral part of our daily lives. We use passwords to check our social media feeds, access our bank accounts, and log in to our work computers. In fact, studies have shown that the
Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? Mobile devices are vulnerable to many different types of threats. The bad guys are increasing