The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud The world is a confusing and lonely place sometimes. Police and security experts have been out in force for years warning lonely hearts not to fall for the romance fraudsters whose schemes cost victims more than US$950 million in 2021 alone. But have … More There’s no sugarcoating it: That online sugar daddy may be a scammer
LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform. Job hunting is hard work, a kind of full-time job in itself. It requires focus and patience to go from one job posting to another … More Common LinkedIn scams: Beware of phishing attacks and fake job offers
Here’s what you should know about some of the nastiest mobile malware – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely. These days, the device in your pocket can do far more than call or send text messages. Your smartphone stores almost every aspect of … More 3 most dangerous types of Android malware
If you’re a sci-fi fan, especially if you’re 40 or over, you have heard “shields up” so many times in your reading and viewing career that you might see shields, deflectors, and force fields as lame carryovers from the early days of sci-fi film and TV. While perhaps Buck Rogers’ or Flash Gordon’s ships didn’t have shields, there aren’t … More Shields up!
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity. Zero-day vulnerabilities have always had something of a special reputation in the cybersecurity space. These software bugs are exploited for attacks before the flaw is known to the software vendor and so before a … More What’s behind the record‑high number of zero days?