Scammers have been using a tech support scam for years, selling fake security software. They set up fake websites, offer free “security” scans, and send alarming messages to try to convince you that your computer is infected with a virus or that you might have software issues. Then, they try to sell you something to… Read More


Internet fraud has been an increasing concern for civilians and law-enforcement agencies, ever since the launch of the Internet. Tracking hackers is difficult and catching Internet frauds is even more challenging, the best protection is to avoid fraud attempts. The first part of sidestepping identity theft, viruses and other intrusions is being able to identify… Read More


Phishing attacks are used in an attempt to acquire sensitive information such as usernames, passwords, credit card details, or money, often for malicious reasons, by masquerading as a trustworthy entity by using trusted electronic communication methods such as emails or the SMS system. Types of phising attacks: Deceptive Phishing originally referred to account theft using… Read More