It’s shopping season! While more people choose to do their holiday shopping online, this creates the perfect opportunity for cybercriminals to entice unsuspecting shoppers. Check out how you can avoid scam attempts this holiday season.
Read more…Passwords. We need them for almost everything nowadays. Entering our phones, our computers, social media, and almost any website that involves a credit card purchase or includes personal details. Every time we start a new account on a password-protected site or system, we’re prompted to create a password.
Read more…Eavesdropping. It used to be something we did to people who shared the same space with us before text messages was a thing. We would put our ear against the door and desperately tried to pick up any parts we could of the secret conversation in the next room. Nowadays, we can have a conversation with a friend about the new Kanye West album, and then as soon as we go into Facebook, what do you know? An ad for that Yeezus album comes up.
Read more…With the huge increase of people working from home due to Covid-19, millions of home laptops and desktops are laying around open, and with Zoom calls demanding our cameras to be open, webcam hacking even is a hot commodity for hackers these days. Webcam hacking, or ‘camfecting’ (camera + infecting), is a hacking technique that enables the hacker to remotely take control over another person’s webcam, without that person’s knowledge or permission.
Read more…Sextortion – a portmanteau of the words sex and extortion – is a broad term used to describe the practice of exploiting a person (usually in an attempt to get money) by threatening to reveal evidence of their sexual activity, often explicit photos or videos. Sextortion is not a new concept, and we can find evidence of the term being used as early as the 1950s. But the modern definition of sextortion is widely understood to be linked with exploitation through technology – email scams, webcam hacks, stolen photos and videos, etc. It is seen as a growing problem internationally, and it is another weapon that cybercriminals use to target us.
Read more…