
Meme coins and NFTs: How not to lose your shirt
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
230 articles
Everything you wanted to know about meme cryptocurrencies — such as TRUMP and DOGE — and ways to win or lose big.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
Scammers have invented a new trick — they post cryptowallet seed phrases in YouTube comments using newly created accounts. Here’s how it works
Scammers posing as buyers snatch one-time codes during online product demos.
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
Five dead simple tips to greatly improve your defenses against cybercriminals.
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
We’ve discovered a new Trojan that’s very selective about its victims.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
Scammers prepared carefully for this very sporty summer. First they targeted soccer fans during the Euros; now they’re setting their sights on spectators at the Paris 2024 Olympics. How can you stay safe from scams during the Games?
A turnkey home? A turnkey website? How about turnkey phishing? Scammers now sell turnkey phishing services to other scammers. Read on to find out how it works.
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.