Common WhatsApp scams and how to avoid them

Here’s a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them. With more than two billion users, WhatsApp offers a vast pool of potential targets for scammers. To make things more complicated, fraudsters aren’t known for … More Common WhatsApp scams and how to avoid them

Is that survey real or fake? How to spot a survey scam

“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online. Online surveys and quizzes are all over the internet. They’re quick and cheap to set up, easy for recipients to fill out, and simple for researchers to … More Is that survey real or fake? How to spot a survey scam

Top 10 Venmo scams – and how to stay safe

Don’t be the next victim – here’s what to know about some of the most common tricks that scammers use on the payment app Today’s consumers have a wealth of choice when it comes to paying and sending money online. A range of slick digital payment apps have emerged over recent years to make the whole process as … More Top 10 Venmo scams – and how to stay safe

How to set up parental controls on your child’s new smartphone

Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls While your child will be over the moon with their shiny new device, you begin to wonder how to stop the kid from spending every waking hour glued to the gadget. Chances are that … More How to set up parental controls on your child’s new smartphone

Tractors vs. threat actors: How to hack a farm

Forget pests for a minute. Modern farms also face another – and more insidious – breed of threat. While I was in the UK police force and part of the National Cyber Crime Unit in 2018, I was asked to give a talk on cybersecurity at a National Farmers’ Union (NFU) meeting in southern England. Right after … More Tractors vs. threat actors: How to hack a farm