Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.
Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.