
New ransomware puts child pornography on victims' smartphones
Researchers have discovered a scary new form of ransomware scam that targets smartphone owners and uses images of child pornography in an attempt to extort money from them.
Initializing security protocols...
Explore 8 articles related to Phishing

Researchers have discovered a scary new form of ransomware scam that targets smartphone owners and uses images of child pornography in an attempt to extort money from them.

If you have ever received a call where the caller said that you called them when you have not, then your number was most likely spoofed by another person. Worried? you should be! read more now.

Most of us have been trained to be careful of clicking on links and attachments that arrive in emails unexpected, but it’s easy to forget scam artists are constantly dreaming up innovations to improve their phishing scams. Think you’re too smart to fall for one? Think again: Even technology experts are getting taken in by some of the more recent schemes called: Vishing.

Employees play a crucial role in running a successful business. An untrained and negligent workforce can put your enterprise in danger of multiple data breaches. Organizations must adopt an easy to accomplish security training program that should have the essential guidelines needed to stop Information Security Threats.

A work of fiction? Is the future is here? In this article you will learn that in the near future, Artificial Intelligence will be able to hack, manipulate and compromise your organization's or personal data, without any human intervention.

Spring in Israel isn’t just about blooming flowers and holiday vacations. It’s also peak season for phishing when scammers use email, text messages, and fake websites to trick people into giving up their personal information. It’s the best “hacking time” when phishers and fraudsters take advantage of people when they’re distracted.

How to use Facebook and keep some of your privacy: endless year of privacy scandals may have been the biggest cyber security story of 2018. So you may be wondering if it’s even possible to use Facebook and keep your privacy.

How to keep your passwords from being an attacker’s key to your account, The whole point of a password is to keep unauthorized people out of your accounts. But when not constructed and used properly, passwords can do just the opposite. In fact, you can think of a poor password as a key to let the wrong person in.