Bank phishing and identity theft
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
Spam Analysis Expert
52 articles
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
We reveal more cunning cybercriminal tricks and explain how to guard against scams.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
Phishers are using Google online services to take over Microsoft online service accounts.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Scammers are cashing in on the PlayStation 5 shortage. Here’s how to avoid their bait.