Don’t believe your ears: voice deepfakes
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
128 articles
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
How scammers force website owners to add potentially dangerous links by threatening harsh consequences for copyright infringement.
Scammers are using social engineering to shake down newly onboarded employees.
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
We review a major cryptocurrency theft using spyware inside a PDF.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
How cybercriminals extract bank card details pretending to be DHL.
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
We reveal more cunning cybercriminal tricks and explain how to guard against scams.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.