Your comments on social media can send out a signal to scammers, letting them know you are vulnerable to attack. Criminals are searching online for someone they can social engineer, or manipulate, into giving them what they want. And they’ve learned that people looking for concert tickets can be easy marks.
Read MoreYou’ve seen a CAPTCHA, where you have to select all the pictures of bicycles or bridges to get into a site or account. Attackers are using fake security steps to try to trip you up. Here’s what to look for.
Read MoreWorried about cyber criminals hiding in your email? Here’s one way they’re trying to get in, plus how you can track them down.
Read MoreYou might know to watch out for risky links in messages. So attackers are trying a different tactic to get you to click on their poisonous links. Here's what to watch for.
Read MoreIs someone using video of you for fraud? Scammers are grabbing people’s videos to turn into ads for fake products. Here’s how they’re doing it with a bogus device that claims to slash your electricity bills, supposedly endorsed by Elon Musk and Leonardo DiCaprio.
Read MoreCan cyber criminals attack the water you drink by hacking the water plant with ransomware? We take a look at an attack that stirred up questions at water utilities around the globe.
Read MoreAttackers can fake a face. But now it's easier and easier for them to fake an entire personality with the push of a few buttons. Here’s how they do it.
Read MoreVolunteers are working to protect Ukraine from cyberattacks and cyber spies during Russia’s full-scale invasion. They know their work could save people from torture and death.
Read MoreIf you get a suspicious message from a friend on social media, you might ask questions to see if it's really them. But what if the scammers have all the right answers? Now some tricksters come prepared. Here's how to be ready.
Read MoreIf you forget your PIN code for a cryptocurrency wallet, your money could be gone forever. But an expert hacker is turning this memory disaster into a new passion and a new business: breaking into wallets for people who’ve lost the crucial bit of info standing between them and their crypto cash.
Read MoreNow, creating a deepfake voice is as easy as downloading an app on your phone or software on your laptop. What can you do to detect a voice deepfake before you lose money to audio tricksters? Here are four ways to uncover a voice fake.
Read MoreIn times of war and world conflict, you need to be able to spot deepfakes --- computer-generated people --- before they manipulate you. Here are three ways to do it.
Read MoreIt's a nail biter. Eleven teams of hackers from around the globe meet in Miami for what some say is the biggest industrial hacking contest in the world.
Read MoreA screenshot may not sound dangerous. But Instagram hackers are using them to take over people’s accounts. Here’s how they do it.
Read MoreWatch out for fakers on Microsoft Teams. Researchers say cyber crooks are sneaking into Teams and trying to get you to download malware that can spy on you.
Read MoreThis is an appointment you DON’T want to add to your busy schedule: a fake virtual meeting run by a fake boss trying to steal money.
Read MoreAttackers want to use you to spread misinformation. Here’s how you and companies large and small can protect yourselves.
Read More