Spam mail with vishing numbers
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
53 articles
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
People are receiving phishing e-mail messages with requests for payments for a package delivery, with links to a fake postal service website for making the payment.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
One explanation of phishing success lies in a known psychological effect.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
Fraudsters are using the feedback forms on the websites of reputable companies to send spam.
A new spam mailing threatens the reputations of small businesses websites.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.