No items in your cart
No items in your cart
Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
What is common between Lily Collins, Britney Spears, Sandra Bullock, Adriana Lima, Katy Perry and Jon Hamm? Give up? I’ll give you a hint: All are more dangerous than you think. Those are the top ten searched celebrities on the web that if you look for various details about them, especially the kind of revealing […]
“I am a single American soldier, would you send me money?” – this is how a mother and daughter convinced hundreds of victims to send them money as part of a huge ‘Nigerian Scam’ style fraud. The Nigerian Scam is one of the more common types of financial frauds. This scam is usually carried out […]
Since the last blogs posted about multiple social networks frauds, I’ve been getting multiple questions so I’ve decided to publish the common fraud attack methods and how to recognize and avoid them. The social networks are very fertile ground for cybercriminals, and sometimes it is difficult to distinguish between true stories and those who spread […]
If you receive an e-mail supposedly from the ‘Bank of America’, with an alleged expenses report attached, make sure you do not open it. Delete it at once. The subject of the e-mail states that this is a ‘”statement of expenses” report notification, with a matching message inside, tagged with the ‘Bank of America’ logo […]
A young Spanish hacker developed a fictive application, which offered users to spy on private messages of their WhatsApp friends. Thousands users went into the site, which required them to register their mobile number. Whoever typed the number fell into a huge fraud by automatically being assigned to an advertisements site that sends ads for […]
A significant security breach in SIM cards was revealed, allowing attackers to take control over users’ phone and do whatever they please, without the user noticing. Up until now, security breaches were discovered in certain operating systems such as Android, iOS or Windows Phone. Now , it turns out that there are security holes that […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.