Articles tagged: Phishing

A photorealistic image of a semi-transparent Trojan horse. The horse is made of a glass-like material, allowing visibility inside. Inside the Trojan horse, there is a clearly labeled package that reads 'Malware'. The background is neutral and simple, emphasizing the Trojan horse and the package inside.

Are Zip Files Safe to Open?

ZIP files are useful for compressing and containing collections of files. Unfortunately, they’re also useful to hackers, spammers, and scammers.

A person receiving a scam call. The person looks confused while holding a phone. A large speech bubble from the phone says 'Give me the code!' Contrasting this, another speech bubble from a nearby computer screen says 'Never share this code.'

One-Time Code Contradiction: When to Share and When to Beware

You’re told not to share your two-factor or other authentication code. And then you’re asked for it.


Tip of the Day: Avoid Being Tricked by a Simple Lie

An investigator, characterized by a friendly and approachable design, using a magnifying glass to look closely at an email message on a computer screen. The scene is set in a dimly lit room, highlighting the focus on the screen, suggesting the importance of paying attention to detail. The investigator's expression is one of curiosity and determination, emphasizing the significance of scrutinizing every piece of information to uncover the truth behind the email message. This image should inspire viewers to be more diligent and thoughtful when examining their own emails.

Behind the Scam: Decoding the Secrets of Fraudulent Emails

Scam emails often have clues ranging from obvious to obscure. I’ll take a scam email and show you what I see.

An adorable kitten sitting at a computer desk, carefully examining the URL displayed in a web browser on the computer screen.

How Can I Tell If a Web Address Is Safe?

URLs are simple in concept, yet can be constructed in ways that might fool you. I’ll look at some examples and discuss what’s important.

The scene includes a metaphorical depiction of the scam process, showing a digital landscape with a piggy bank standing on one side, looking full and healthy, connected by a series of digital pathways and strings to a shadowy figure on the other side, who holds a butcher knife made of binary code, symbolizing the scammer preparing to 'butcher' the victim's savings. The background is a mix of digital and real elements, such as a cityscape blending into a circuit board, representing the intersection of technology and everyday life where these scams take place. Include symbols like chat bubbles, hearts, and dollar signs floating between the piggy bank and the shadowy figure to represent the building of trust, emotional manipulation, and financial transactions involved in the scam. The overall atmosphere should be ominous yet subtle, highlighting the deceptive and hidden dangers of online scams.

What Is a Pig-Butchering Scam?

Pig-butchering is a nasty term for a particularly painful type of scam. Here’s how to protect yourself.


Tip of the Day: Don’t Click on the Link Your Bank Sent You

Comparing links

Tip of the Day: Hover Before Clicking

No Spam

Why Is There So Much Spam?

Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.


12 Steps to Keep from Getting Your Account Hacked

Here are the steps you need to take to prevent losing your account forever to a hacker.

What's that on my mobile?

What Is Smishing?

Smishing is simply text-messaging spam. Learn to recognize and respond appropriately to it.

Distracted by Phishing

The Biggest Risk to Your Security

The biggest risk to your security might just be you. Learn why and what to do.

Password Entry

I’m Told to Change My Password. Why?

If you’ve been told to change your password, do so, but do so in the right way. I’ll explain what that means and why it’s important.

Beware: Phishing

7 Signs of Phishing to Watch For

A friend received a fairly convincing phishing attempt. I’ll cover the signs that showed it was bogus.


Phishing: How to Know It When You See It

Phishing is a way scammers trick you into providing personal and financial details. Phishing opens the door to identity theft and more.

Evil Reply

Tip of the Day: Be Careful, Even With Replies

Working from home

Five Steps to Better Security Working from Home

Security threats for people working from home are increasing. I’ll review steps you need to take to keep yourself, your company, and your job safe.


Are HTTPS Connections Really Safe?

HTTPS is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.

Spam email relating to COVID-19

Tip of the Day: Legitimate Information Doesn’t Arrive Unsolicited


Tip of the Day: Your Anti-malware Tool Will Fail

Desktop Shortcuts to Important Sites

Tip of the Day: Put Important Website Shortcuts on the Desktop

Why Does Legitimate Email from PayPal Instruct Me to Click a Link?

Why Does Legitimate Email from PayPal Instruct Me to Click a Link?

The rule is, never click on links unless you are 100% certain that they are from who you think they are. The question is, how can you be certain?

What is it About Attachments?

What Is It About Attachments?

Email attachments are useful, ubiquitous, and convenient. They’re also abused, dangerous, and responsible for infections and data breaches.

Is Online Banking Safe?

Is Online Banking Safe?

You can bank online safely, as long as you know what to look for and what steps to take.

LastPass Master Login

Possible LastPass Phishing Vulnerability

News broke over the weekend regarding a potential phishing vulnerability that could lead you to give a hacker your Lastpass master password.

Phone Scam

Is My ISP Calling Me to Clear Up My Problems with Windows?

In a brazen scam attempt, you may get a phone call from someone claiming to be your ISP or other service provider to “help” you with your Windows problems. Don’t fall for it.

Credit Card Swipe

Should I take the security protection offered after the most recent security breach?

Hackers are very good at sending emails that look like they come from legitimate companies. So, how do you tell the truth from a lie?


Is the internet just full of scams?

Many advertisements of computer products include promises that they can’t keep, or know that they won’t keep. By making things seem much worse than they actually are they attempt to entice – or even scare – you into purchase tools you simply don’t need.

Giving a Thief Your Password?

Why Does this Email Message Ask Me to Enable HTML When It Already Is Enabled?

Viewing an email in HTML seems to be the default in the new There is no easy way to change it. So why are you seeing this message?