Tech Support Scam Uses Child Porn Warning

Tech Support Scam Uses Child Porn Warning

A new email scam is making the rounds, warning recipients that someone using their Internet address has been caught viewing child pornography. The message claims to have been sent from Microsoft Support, ...
Cybercrime victims report $2.71 billion in damages to the IC3 in 2018

Cybercrime victims report $2.71 billion in damages to the IC3 in 2018

The Internet Crime Complaint Center (IC3), a cybercrime-focused division of the US Federal Bureau of Investigation (FBI), registered over 350,000 complaints of suspected Internet crime in 2018 that cost the complainants upwards ...
How does Caller ID Spoofing work? (BTSS)

PSA: Users with landlines are more vulnerable to scams

Anyone still using a home phone be warned: having landlines makes you particularly vulnerable to scams. Read on to learn how to keep your landline but stay safe from cyberattacks. Categories: Cybercrime ...
Fake Malwarebytes helpline scammer caught in the act

Fake Malwarebytes helpline scammer caught in the act

In this blog, we take you through a phone call to a fake Malwarebytes helpline run by Blue Eye Ventures, and show you how to spot the scam in action. Categories: Cybercrime ...

A week in security (May 7 – May 13)

A roundup of security news from May 7 – May 13, including a new zero-day for Internet Explorer, a Netflix phishing scam, a worm found in Facebook's Messenger, and more. Categories: Security ...
Where did the tech support scam blacklist go?

Where did the tech support scam blacklist go?

We've removed our blacklist of recognized tech support scammers from our tech scam support page. Here's what we're doing instead. Categories: How-tos Tags: how toscambaitingtech support scamTSS (Read more...) The post Where ...
Reports of tech support scams rocket, earning handsome returns for fraudsters

Reports of tech support scams rocket, earning handsome returns for fraudsters

A typical technical support scam works like this: 1. A user receives a phone call, claiming to come from an operating system vendor or ISP claiming that a security problem has been ...