Scams

Don’t Make Friends With Social Media Phishing Scammers
Matt Solomon | | BullPhish ID, credential loss, MSP Business & Marketing, MSP Resources, MSP Solutions, MSPs, Passly, Phishing, phishing awareness, phishing resistance, phishing resistance training, Phishing Threats & Phishing Resistance, Scams, security awareness training, Small & Medium Business Cybersecurity Management, small business, smb, SMB Cybersecurity, social media
Social media phishing scammers are proliferating as cybercriminals look for ways to capture credentials & data in a challenging economy ...
Scams Starting on Social Media and Targeting Your Business
Tripwire Guest Authors | | cybercrime, cybercriminals, IT Security and Data Protection, Scams, social media, Web security
Social media is no stranger to scams. However, recent trends show scammers have started to show more aggression toward businesses since the beginning of the pandemic. Being able to recognize these scams ...

Leading Indicators Foreshadow COVID-19 Vaccine Scams
Scammers are readying themselves to profit from fear, uncertainty and the misfortune of others ...

Holiday Shopping Scams and Tips to Stay Safe
Tom Eston | | Cybersecurity, Digital Privacy, Episodes, gift card, holiday, Holiday Shopping, Monthly Edition, Phishing, Podcast, Privacy, Scams, Shopping, social engineering, tips
In our November monthly episode we discuss the scams that you may encounter this holiday shopping season due to the pandemic and our top tips on how to stay safe and more ...
Detecting Phishing Emails
Research paper: Rick Wash, “How Experts Detect Phishing Scam Emails“: Abstract: Phishing scam emails are emails that pretend to be something they are not in order to get the recipient of the ...
Protect Your Employees from Business Email Compromise Attacks
Mehul Patel | | business email compromise, CEO wire fraud, email scam, email security, imposter threats, mail spoofing, payloadless attacks, payroll diversion, Scams, threat detection
Menlo Imposter Threat Detection Flags Payloadless Attacks that Impersonate Senior Executives and Other VIPs Cyberattacks aren’t always delivered via a payload such as a link to a malicious URL or an infected ...
Deepfake Voice Technology Iterates on Old Phishing Strategies
Tripwire Guest Authors | | AI, cybercrime, Featured Articles, IT Security and Data Protection, Phishing, Scams
As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent. This growing sophistication of the latest software and algorithms ...

85% of all YouTube Channels Removed in Q1 Flagged Over Malicious or Fraudulent Content
Alina Bizga | | Industry News, Malware, Misinformation, Scams, spamming, YouTube, YouTube Community Guidelines enforcement
YouTube removed nearly 2 million channels in the first quarter of 2020, 85% of which were terminated due to the promotion of scams, misinformation, and, in some cases, for spreading malware. A ...
On the Twitter Hack
Bruce Schneier | | Bitcoin, encryption, essays, Hacking, nationalsecuritypolicy, Scams, socialmedia, Twitter
Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system ...

Emergencies and Cyberattacks: 3 Common Scams
Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is ...
Security Boulevard