Archives - Cybercriminal


What is social engineering?

Cybercriminals perform social engineering techniques such as phishing, baiting and spear phishing to manipulate their targets into disclosing personal information. Social engineering relies on human interaction to get access to the confidential information they need to commit cybercrimes. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or […]

Be smart on open public Wi-Fi networks

When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or […]

Never share your Medicare number with anyone except your doctor

When you receive your Medicare card in the mail, put it in a secure place where no one will find it. And if someone contacts you by phone or email asking for your Medicare number, don’t give it to them. Cybercriminals who pose as health care professionals can use this information to steal your identity.

Turn off Bluetooth to avoid getting AirDrop spam

Cybercriminals often use Bluetooth channels as a way to invade peoples’ smartphones. For user convenience, iPhone and Android devices automatically leave Bluetooth on. So to avoid receiving unwanted AirDrop spam, remember to always switch Bluetooth (and Wi-Fi) off when you’re done using it.

Update your browser plug-ins

Cybercriminals often target outdated plug-ins like Flash and Java since they’re easier to infect with malware. Keep hackers out by making sure you’re always running the latest version of those plug-ins, or, even better, don’t use them at all. Many sites now use HTML instead anyway.

Enable full disk encryption on your device

Further protect your data and storage from cybercriminals by using full disk encryption (FDE). This feature encodes your data into a form that cannot be understood by anyone without the encryption key. Many mobile devices enable this by default, but others (like Macs and PCs) may require a specific set of steps.