Organizations often use email to send their employees invoices that they need to pay. Now, cybercriminals are taking advantage of this process by using fraudulent funds transfer (FFT) scams. In FFT scams, cybercriminals try to manipulate you
Organizations often use email to send their employees invoices that they need to pay. Now, cybercriminals are taking advantage of this process by using fraudulent funds transfer (FFT) scams. In FFT scams, cybercriminals try to manipulate you
Facebook pages are typically used by organizations and public figures to connect with their community. Anyone can make a Facebook page, even cybercriminals. Using social media, cybercriminals spoof brands and organizations to trick people into trusting them.
Have you ever received text messages about special discounts or promotions for a service you use? Many legitimate organizations send promotional text messages to their customers. Unfortunately, cybercriminals are sending text messages with fake promotions to try
For years, cybercriminals have used social media to post fake listings for popular items such as furniture or electronics. As these scams have grown in popularity, many people have learned to be careful when buying items online
The social media app TikTok is popular for its creative audio and visual filters. TikTok adds and removes filters frequently, so some users may look for ways to access filters that haven't been added. Now, cybercriminals are
You may be wondering what homoglyphs and Unicodes are. Homoglyphs are letters or characters that look similar. For example, the character “e” looks similar to the character “ė”. Unicode is a unique code assigned to characters so
Organizations often use email to send important information to their customers. If an organization sends out an email that’s missing information, they may send you a follow-up email. Now, cybercriminals are using a technique called “clone phishing”
Cryptocurrency exchanges are platforms that allow you to buy and sell cryptocurrencies, such as Bitcoin. When you buy cryptocurrency, it’s stored in a digital wallet. Most cryptocurrency exchanges require that you use an additional authentication method, such
Be on the lookout for all incoming communications, such as text messages, voice messages, and emails, as this is where you will find most scams. The top scams to watch out for this holiday season: Smishing (fake
Elon Musk, the CEO of Tesla, recently purchased the social media platform Twitter. Since this purchase, Twitter started allowing users to pay for a monthly subscription called “Twitter Blue.” Twitter Blue displays a blue verification checkmark next