Phishing attacks are used in an attempt to acquire sensitive information such as usernames, passwords, credit card details, or money, often for malicious reasons, by masquerading as a trustworthy entity by using trusted electronic communication methods such as emails or the SMS system. Types of phising attacks: Deceptive Phishing originally referred to account theft using… Read More


Investment scams are becoming more and more frequent due to the amount of money these scammers can coax out of you. It’s not unusual to see messages showing “investments” that promise high rates of return with little or no risk. Many versions of these scams claim to seek investors to help form a new company… Read More


We often discuss jurisdiction, or hear it used on our favorite TV crime shows, but what does it really mean? When is something a federal, state or local matter and who can enforce which laws? How is it determined? The primary distinctions between areas of jurisdiction are codified at a national level as part of… Read More