Learn to Spot a Phony

Phone scams are a type of social engineering scam, which seek to dupe often busy recipients into disclosing sensitive information or providing seemingly harmless responses to questions. This article reviews some of the common phone scams and provides recommendations and best practices. More →

Phishing, Spear Phishing, and Whaling

Workplace and personal email have become the most common attack surfaces for opportunistic and targeted phishing scams. Phishing scams use social engineering to target end users. There are variations of phishing, which have distinguishing features that may be categorized using terms such as spear phishing or whaling. More →

Ransomware Scams

Ransomware is malware that tricks users into installing itself on their devices. Ransomware scams most commonly occur via email social engineering scams, a/k/a phishing scams. In ransomware attacks, malware encrypts a user’s files and requests ransom payment, often in bitcoin, to unlock the files and restore encrypted content to users. More →

Under Lock and Passphrase

When it comes to passwords for your various online accounts and services, a best practice is to use a unique password for each. After all, if passwords are shared between accounts and one is compromised, it creates a security risk for other accounts with the same password. It can also be very difficult to remember increasing numbers of strong passwords, many of which are required to contain special characters and capitalized letters. More →