Archives - Cybercriminal


Be smart on open public Wi-Fi networks

When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or […]

Never share your Medicare number with anyone except your doctor

When you receive your Medicare card in the mail, put it in a secure place where no one will find it. And if someone contacts you by phone or email asking for your Medicare number, don’t give it to them. Cybercriminals who pose as health care professionals can use this information to steal your identity.

Turn off Bluetooth to avoid getting AirDrop spam

Cybercriminals often use Bluetooth channels as a way to invade peoples’ smartphones. For user convenience, iPhone and Android devices automatically leave Bluetooth on. So to avoid receiving unwanted AirDrop spam, remember to always switch Bluetooth (and Wi-Fi) off when you’re done using it.

Update your browser plug-ins

Cybercriminals often target outdated plug-ins like Flash and Java since they’re easier to infect with malware. Keep hackers out by making sure you’re always running the latest version of those plug-ins, or, even better, don’t use them at all. Many sites now use HTML instead anyway.

Enable full disk encryption on your device

Further protect your data and storage from cybercriminals by using full disk encryption (FDE). This feature encodes your data into a form that cannot be understood by anyone without the encryption key. Many mobile devices enable this by default, but others (like Macs and PCs) may require a specific set of steps.

4 common imposter scams to watch out for

Impersonation is a popular tactic among cybercriminals today. By putting enough space between them and their victims, the internet makes it easy for scammers to pose as government agents, representatives of well-known organizations, and even loved ones via emails, direct messages, phone calls, etc. Once they have your trust, these fraudsters will try to coerce […]