A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.
Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat.
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?
Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.
Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?