teenager using a mobile phone

Account Takeover

For many of us, social media is how we connect with the world, stay in touch with friends and family, and even conduct business.  When cybercriminals take over our social media accounts, they invade our space, impersonate us, and access our sensitive information.  For more about account takeover ...

patcrypt a large team of developers with code on their screens

Business of Cybercrime

With criminals adopting principles akin to legitimate enterprises, the cost, efficiency, and precision of their attacks increase, posing a greater challenge for individuals and organizations to safeguard themselves. For more about the business of cybercrime ...

futuristic criminal in a hoodie on a computer screeen

Business Email Compromise

Business Email Compromise (BEC) is a sophisticated cybercrime that involves attackers gaining unauthorized access to a business email account and using that account to steal funds and information. For more about BEC ...

distressed woman looking at her cell phone

Cryptojacking

Cryptojacking stealthily uses your computers and electricity to mine cryptocurrencies such as Bitcoin, Ethereum, or Monero, generating profits for the attacker. For more about cryptojacking ...

young man watching his smart phone

Cryptocurrency Scams

A cryptocurrency scam is a fraud involving digital currencies that aims to deceive investors with false promises or to trick them into giving away access to their digital wallets. For more about cryptocurrency scams ...

distressed woman looking at her cell phone

Cyberstalking

Cyberstalking is a form of online harassment that involves using the internet or other forms of electronic communication to stalk or harass an individual. For more about cyberstalking ...

professional_photo_of_a_man_in_a_suit

Insider Threat

Insiders may intentionally or unintentionally misuse their access privileges to steal data, sabotage systems, or harm the organization's operations. For more about insider threats...

stylistic illustration of a house with many IoT devices

Internet of Things (IoT) Attacks

IoT devices include appliances and other household items, wearable gadgets, industrial machines, and smart city systems. Adversaries can exploit the weaknesses of IoT devices and their connection to each other and the networks they are on. For more about  IoT attacks ...

An example of a malicious advertisement

Malvertising

Malvertising is the use of online website advertisements to disseminate malware.  Cybercriminals inject malware into seemingly innocuous ads. For more about malvertising

two young men looking at their phones with concern

Malware

Malware, or malicious software, is software designed to damage computers, smartphones, routers, servers, or computer networks. It can take various forms, including viruses, worms, Trojans, ransomware, spyware, and adware. For more about malware

 CC0 Public Domain

Phishing Email

Phishing scams typically involve fraudulent emails, text messages, or websites that mimic legitimate organizations or individuals to deceive recipients into revealing sensitive information, such as passwords, credit card details, or account numbers. For more about phishing emails 

Data Protection - person typing on keyboard

Preventing Cybercrime

Just as you use locks to keep criminals out of your home, you also need safeguards to secure your computer. For more about preventing cybercrime ...

man at a computer suffering a ransomeware attack

Ransomware

Ransomware is malicious software that uses encryption to deny access to a computer system or files until a sum of money, or ransom, is paid to the attacker.  For more about ransomware ...

young woman looking at her phone

SIM Swapping

SIM swapping, SIM hijacking, or SIM jacking happens when a cybercriminal transfers a victim's phone number to a SIM card they control. This enables them to receive the victim's calls and messages and bypass SMS-based multi-factor authentication (MFA). For more about SIM swapping ...

young black woman looking at her phone

Smishing

In SMS scams or smishing, fraudsters use text messages to trick victims into sharing personal information, clicking malicious links, or making unauthorized payments. These messages often impersonate trusted sources using tactics similar to phishing attacks. For more about smishing ...

Rachel Tobac. (2022 Sep 28). Inside the mind of an ethical hacker

Social Engineering

In social engineering, attackers manipulate individuals into divulging confidential information, providing access to systems, or performing actions compromising security.  For more about social engineering ...

image of a green circuit board

Supply Chain Attacks

Supply chain attacks exploit vulnerabilities in a target's suppliers. Instead of attacking the target directly, attackers compromise third-party software or hardware, embedding malicious code or backdoors later passed to the target organization through the supply chain. For more about supply chain attacks ...

References: