

Roses are red, violets are blue, and we all know that not everything – or everyone – online is true. But can you tell the difference between someone who is simply using a decades-old photo and a lothario scammer trying to swoon their way to every dollar in your bank account?
Researchers at Vade Secure describe a type of phishing attack dubbed “clone phishing,” in which attackers follow up a legitimate email from a trusted sender with a replica, claiming that they forgot to include a link or attachment.
Want to view or change your privacy/security settings, but don’t know where to find them? Use these direct links to update your privacy settings on popular devices and online services or read about your platforms’ privacy policies and statements.
As you embark upon your next adventure, remain cyber safe following some simple practices to keep your vacation plans free from cybercriminal meddling.
Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information.
Data breaches seem to happen like clockwork. None of them are your fault, but the responsibility to protect yourself and your personal information rests square on your shoulders. It can seem like a daunting task, but there are some fundamental actions that can be taken right now that can make you a significantly safer from falling victim to a cyberattack.
It’s time to resurrect the old adage “With friends like these, who needs enemies?” Thanks to the nonprofit Identity Theft Resource Center (ITRC), their work has uncovered a social media hack victimizing users of Facebook and Instagram using friendship as a lure.
Your online accounts, computer, and phone hold a lot of your personal, financial, and health information. Information that’s valuable to you — and to scammers who try to steal it. Here are five things to do to keep hackers out of your accounts and your personal business.
Did Spectrum or another provider call with an offer to lower your monthly TV, cable, or internet bill in exchange for a pre-payment or fee? It wasn’t them. It was a scammer, and you’re not alone.
Not sure which sources to trust when you're online? These browser extensions can help you figure out how to detect misleading articles and untrustworthy websites.
Hackers know a secret many of us share: we reuse passwords. Don’t. That’s one takeaway from the FTC’s case against online alcohol delivery platform Drizly. Here’s what to do after a data breach and why.
If there is a problem, we will mail you a letter. Generally, we will only contact you if you have requested a call or have ongoing business with us. The latest scam trick of using robocalls or live callers has increased.