Don’t be a Romance Fraud Victim this Valentine’s Day
Romance Fraud has become more common knowledge over the last few years thanks the media and conversation surrounding 'Catfishing' - the act of luring a person into a relationship through…
Romance Fraud has become more common knowledge over the last few years thanks the media and conversation surrounding 'Catfishing' - the act of luring a person into a relationship through…
When it comes to online scams and attacks it’s a common belief that older generations, being less adjusted to the every day use of technology and the associated risks, are…
Just two weeks ago a data dump named Collection #1 completely redefined data breaches by publishing a database of millions of compromised emails and passwords, making up the largest data…
Over the years it seems that the general public is finally starting to grasp the importance of having a strong and original password to protect their personal data – but,…
Fraudulent websites, or ‘spoofed websites’, are used by cyber-criminals to trick users into entering sensitive data under the impression that it is a trusted site. These websites usually impersonate popular…
What is Keystroke Logging?Keystroke logging - also known as keylogging, spyware, and more – is a hacking tactic that uses malicious software to monitor any keystrokes, allowing the attacker to…
Social media is no longer just a luxury for the consumer, but a vital platform for businesses to reach their audiences in a quick and cost-effective way, as well as…
What is Malware?Malware, or malicious software, is an overarching term referring to any program or code designed to cause harm to computers and networks. The main intention of these attacks…
Chances are you are familiar with the common cyber attack that is Phishing – emails impersonating an authority figure or trusted company to trick the user and gain sensitive data…