KEY POINTS In 2019, Cyber criminals exploited a vulnerability associated with Facebook’s import contact feature, which is used to find… Read more Another Facebook Data Breach? Here’s What You Need to Know!

KEY POINTS In 2019, Cyber criminals exploited a vulnerability associated with Facebook’s import contact feature, which is used to find… Read more Another Facebook Data Breach? Here’s What You Need to Know!
KEY POINTS Phishing is a common method used to deploy malicious software on a victims machine. Verizon’s 2020 Data Breach… Read more Can You Get Hacked Through Google Drive?
KEY POINTS As documented in its 2019 Internet Crime Report, the FBI’s Internet Crime Complaint Center (IC3) received 467,361 complaints… Read more 3 Types of Scams You Are Likely to See This Holiday Season and How to Avoid Them!
KEY POINTS Phishing, and its telephone-based derivative, vishing, remain a significant threat to both individuals and businesses. Symantec’s 2019 Internet… Read more You have a call from “Scam Likely” – How to Avoid Vishing Calls!
KEY POINTS “One in 10 adults in the US will fall victim to fraud every year.” (Business Insider, 2019) In… Read more How to Avoid Falling Victim to a Gift Card Scam!
KEY POINTS Pyramid schemes work by moving money from those on the bottom of an organization to the top. The… Read more “Want to Turn $100 into $800?” – The Anatomy of the Circle Game