You already know to watch for fake emails from attackers. But here's a bit of a twist. Cyber crooks are jumping into your email conversations to send you their own poisonous replies, and they're using fresh tactics along the way. Here's what to watch for and how to avoid the cyber crook 'reply guys' who want to take your money and passwords in thread hijacking attacks.
Read MoreOne year after the launch of the Russian war against Ukraine, we interview a Ukrainian cyber defender who spends her days and nights protecting data and infrastructure from cyberattacks. Her attitude and her views may be surprising to people outside of this country ravaged by war.
Read MoreWant to know how to make a catfisher sing? We take you inside a romance scam investigation to show you the crooks’ current tactics, plus you’ll hear some choice songs from the scammer.
Read MoreDoing a search online? Watch out for fake Google ads promoting criminal sites that can steal your money and passwords. Here's how to detect the fakes.
Read MoreYou think you're getting a refund. But in this scheme, cyber crooks are locking up your screen, messing with your bank account, and making off with your money --- all right in front of you. Here's how it works and how to protect yourself in this latest episode of Cyber Tricks Revealed.
Read MoreAttackers are targeting the machines that run our world, like power, gas and water. This year they created two new pieces of industrial malware, bringing the world total to 7.
Read MoreAre you oversharing? Giving away too much about yourself on social media? Here are three questions to ask yourself about your posts from a social engineering expert.
Read MoreCyber thieves are playing a complex game to get you on the phone and trick you into letting them hack your laptop. Watch out for these devious emails and tactics that could lead you into a total computer takeover.
Read MoreAttackers have found a way to take over and shut down some of the smart devices that run the lights, heating, cooling and security doors at some office buildings. Here's how researchers were able to solve one of these cases and bring the building back to life.
Read MoreSome magic shows use shills --- plants in the audience --- to make their tricks seem real. Now cyber attackers are trying the same thing in emails to see if you'll bite. Here are ways to detect this kind of attack.
Read More