FBI: US victims lost $2.7bn to online scammers in 2018, mostly to email fraudsters
Business email compromise (BEC) scams account for more than half of total losses
Business email compromise (BEC) scams account for more than half of total losses
Losses from so-called ‘remote access’ scams – where cold-calling criminals talk their way onto a victim’s computer under the auspices of providing technical support – are already more than double the total for 2017, according to new figures from the ACCC.
David Braue | 04 Sep | Read more
Don't click "View my bill" if you receive these emails from Telstra or EnergyAustralia.
While there is a general consensus that the Knightscope security robot in Washington, D.C., committed suicide on Monday, the same everyone-agrees-opinion is not true for the $7.4 million heist of the cryptocurrency Ether that happened on the same day.
Give this list to your employees, then go phish yourself
Steve Morgan | 19 Jul | Read more
A firm with operations in India and the US has been charged for using pop-up ads to scare consumers into calling tech support to pay for services they don’t need.
Online fraud and scams dominate the types of cyber crimes targeted at Australians, the nation’s online crime reporting tool has revealed.
Andrew Colley | 18 Jan | Read more
Windows users eager to get their hands on Windows 10 need to watch out for a scam that may leave their files encrypted until a ransom is paid.
There have been numerous reports of a con targeting Apple users, which could possibly cost those who fall for it up to £50. The scam was first reported in the US around 9 months ago and it seems to now be affecting users in the UK. So how can you identify this scam, and more importantly, how can you get rid of it without your valuable information being stolen? Read on to find out.
Lewis Painter | 18 Jul | Read more
Cybercriminals in Japan are targeting iPhone users with an online scam that tricks them into installing a malicious application when they attempt to view porn videos.
Lucian Constantin | 03 Jun | Read more
A vulnerability in Android's default Web browser lets attackers spoof the URL shown in the address bar, allowing for more credible phishing attacks.
Lucian Constantin | 21 May | Read more
The latest versions of Safari for Mac OS X and iOS are vulnerable to a URL-spoofing exploit that could allow hackers to launch credible phishing attacks.
Lucian Constantin | 19 May | Read more
The shamelessness of ransomware pushers knows no bounds. After encrypting people's files and then holding them to ransom, they portray themselves as service providers offering technical support and discounts to their "customers."
Lucian Constantin | 19 May | Read more
Over five percent of browser visits to Google owned websites, including Google Search, are altered by computer programs that inject ads into pages. One called Superfish is responsible for a majority of those ad injections.
Lucian Constantin | 07 May | Read more
For the past several days security researchers have raced to demonstrate that phishing protections added by a new Google Chrome extension can be bypassed with ease.
Lucian Constantin | 04 May | Read more