Hidden text, also known as zero font, allows a malicious email to bypass email security platforms by using invisible characters in between the letters of an email. They are often used to establish the legitimacy of...
We don’t often think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the...
Was it made of gold? Encrusted in diamonds? No. Read on to learn how one laptop ended up being worth a massive one million dollars.
It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the number of reported attacks had already come close to the total for 2019 according to the federal...
It’s always nice to get a postcard from friends or family who are away on vacation. But this week we learned of a new kind of postcard being sent out with not-so-well wishes.
It is easy to get left behind if you become less interesting. No, we aren’t talking about your friends or your childhood toys, although that does happen. We’re talking about YOU. Yes, don’t leave yourself...
A year of credit monitoring along with identity theft monitoring services. That’s what most of us settle for when we find out that our personal data has been compromised. We are alerted, we change our password, we...
Whatever your opinion is of wearing, or not wearing a mask, there are an increasing number of mandates being put in place by governments or independent establishments in an effort to mitigate the spread of COVID-19. ...
Spoofing is a cybercriminal’s malicious misrepresentation of a phone number, website, or email. By masking their true identity, a cybercriminal is more likely to pull off their scam.
