Attackers are ganging up on you in your email
Some magic shows use shills --- plants in the audience --- to make their tricks seem real. Now cyber attackers are trying the same thing in emails to see if you'll bite. Here are ways to detect this kind of attack.
Sneaky attack secretly uploads videos to your YouTube account
If your favorite YouTube channel suddenly starts showing strange videos for game cheats, it could be this cyber attack that spreads like a contagion. Here’s how this YouTube attack works.
Ticket scammers stalk your comments on social media
Your comments on social media can mark you as a target for scammers. If you talk about tickets for concerts or sports events, for example, you may get a message from a crook. Here's how they’ll try to trick you out of money.
Cyber crooks use fake security step to trip you up
It looks like the right move. But this fake security step can cost you your phone or laptop. In Cyber Tricks Revealed, we show you how cyber crooks are putting up fake security steps to trick you into downloading their own file.
Attackers hiding in your email? Here's one way to check
In our newest episode of Cyber Tricks Revealed, we show you how attackers like to hide in your email and one way you can root them out.
Cyber trick gets you to "click" without clicking
Here's our new series about the sneaky things cyber crooks do to steal your stuff. Quick tips on what to watch for and how to protect yourself. In this one, we show you how cyber crooks are getting you to click without clicking.
Scammers steal people's video to sell fake products
Watch out for this ad playing on social media. They not only tries to sell you lies, but they also steal people's video to spin out a believable but very fake story.
What can ransomware do to your water?
Cyber gangs are stalking companies around the world, including water plants that bring you your drinking water. What happens when they try to hold your water company hostage?
Watch out for attacks from virtual people with phantom lives
It's gone far beyond fake faces. Now computers can easily generate virtual people whose lives seem real. And attackers will likely use these phantom people to target you for scams and trickery. Artificial intelligence and deepfakes combine for realistic attacks.
"They can torture, they can kill this person": Volunteers patrol Ukraine's cyber front during war
There are lives on the line. Volunteers work to protect Ukraine from cyber attacks during the Russian invasion. They know their work could keep people from torture and death. Here's what they're doing.