Fake Elder Scrolls Online developers go phishing on PlayStation

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Read more

Deepfakes and LinkedIn: malign interference campaigns

Don’t discount deepfakes just yet. We may not be fooled by phony Mark Zuckerberg anymore, but the discovery of a fake LinkedIn profile sporting a deepfake avatar shows how social engineering can deceive through the mundane.

Read more

Not us, YOU: vendor email compromise explained

Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.

Read more

Help prevent disaster donation scams from causing more misery

Scammers will stop at nothing—not even a tragic natural disaster—for a chance to cash in. We offer some helpful tips to avoid disaster donation scams.

Read more

How to protect yourself from doxing

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Read more

Instagram clamps down on fake messages with anti-phishing tool

We take a look at a new anti-phishing feature Instagram hopes will cut down on imitation messages and other social engineering attempts.

Read more

A week in security (September 2 – 8)

A roundup of the latest cybersecurity news for the week of September 2 – 8, including TrickBot’s new trick, a social engineering toolkit, and how to keep remote workers safe.

Read more

New social engineering toolkit draws inspiration from previous web campaigns

We discovered a web social engineering toolkit that allows crooks to create fake update notification campaigns on both desktop and mobile in up to 30 different languages.

Read more

QR code scam can clean out your bank account

QR code scams are still popular. We should learn to treat QR codes like we do any other unrecognizable URL: with suspicion on where it will take us.

Read more

Reputation management in the age of cyberattacks against businesses

A business’s reputation takes years to build. With the current climate of data breaches, destroying it can take only seconds. What can businesses do to protect their brands from fallout following a cybersecurity incident? We answer these questions and more.

Read more

Select your language