Dangerous investments: App Store scammers
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
137 articles
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
How cybercriminals force victims to work for them with offers of easy money.
Four threats you might face when using Airbnb, and tips for avoiding them.
Beware! Scammers are targeting your WhatsApp. Here’s how to spot and avoid fake WhatsApp calls.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
How scammers can hack your YouTube channel without knowing a password and second factor.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
Watch out! Fraudsters posing as FedEx employees and police officers could be scamming you – including via video-link.
Scammers are pretending to offer users tens of thousands of dollars, supposedly accumulated in an account on an “automated cloud-mining platform”.
How scammers force website owners to add potentially dangerous links by threatening harsh consequences for copyright infringement.
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
Illegal businesses in the shadow economy need employees no less than their legal counterparts. Let’s take a look at how “dark HR” works.