How business e-mail compromise can cost millions
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
112 articles
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
What the Hoax verdict means, and why such software is becoming more of a problem.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
How to steal a million (OK, half a million), or what happened to the Boca Juniors
Cybercriminals take control of corporate mail accounts to send filter-dodging spam.
Dave and Jeff take a look at the latest in the IC3 report, digital clutter, USB devices gone rogue, and more.
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
Scammers are sending tons of YouTube direct messages pretending to be from top YouTubers. They’re phishing. Here’s how the scheme works.
WhatsApp and Facebook are swimming in links to ticket giveaways for fairs and airlines. Don’t get excited, though; the tickets are fake.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
Why you shouldn’t lose your head at the sight of huge discounts, and how to spot a scam online store.
How to protect the financial accounts of your clients without scaring them away.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Here’s how scammers try to phish for verification codes — and what may happen if you send them one.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.