Archives - Cybercriminal


Watch out for the “the fake refund” tech support scam

In this scam, the criminal contacts the victim offering a refund for tech support services previously rendered. The criminal requests access to the victim’s device and instructs the victim to login to their online bank account to process a refund. As a result, the criminal gains control of the victim’s device and bank account. Consider […]

Do a Facebook sweep for personal information

Cybercriminals often scour social media profiles for private information that can be used to guess passwords or otherwise compromise your identity. Periodically check your Facebook privacy settings and look for posts that could provide unwanted information.

How to protect your smart home

A smart home has a network of devices that communicate and operate with one another seamlessly to provide convenience and efficiency. Since they’re all connected to the internet, these devices are controlled by the homeowner, usually through a smartphone app. Examples of smart home devices include door locks, thermostats, smoke alarms, coffee machines and security […]

If something looks suspicious, delete it

Links in email, social media posts, texts, and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, when in doubt, throw it out. Definitely don’t click on a link from a stranger. Employ an email scanning software that scans your email for suspicious emails.

Lookout for spoofed hyperlinks and websites

If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain […]

What is social engineering?

Cybercriminals perform social engineering techniques such as phishing, baiting and spear phishing to manipulate their targets into disclosing personal information. Social engineering relies on human interaction to get access to the confidential information they need to commit cybercrimes. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or […]