Scammers are constantly evolving their tactics, and telephone-oriented attack deliveries (TOADs) are a prime example. These attacks combine phone calls and emails to deceive users into revealing sensitive information or installing malware.
Read MoreBrowser extensions can help make you more productive, enhance your browsing experience, and add useful features—but some can pose security risks.
Read MoreAs the seasons change, it's the perfect time to refresh not only our homes but also our digital security.
In this month's newsletter, you’ll learn tips and tricks on how to clean up your digital safety habits.
Read MorePicture this: You’re heading out on vacation, but while you’re enjoying some well-deserved time off, cybercriminals are hard at work, setting the stage for their next phishing attack.
In this week’s Micro Training, learn how scammers can exploit your Out-of-Office auto-reply emails, and what you can do to stay protected.
Read MoreDid you know Americans lost over $65 million to Bitcoin ATM scams in just the first six months of 2024!
In this week’s Micro Training, learn how these scams work and how you can protect yourself.
Read MoreThese latest scams are designed to lure you in with enticing job offers. The catch? You’re not even looking for a new job!
In this week’s Micro Training, learn how scammers are getting more creative with fake job recruitment scams that could expose you to identity theft, malware, or financial fraud.
Read MoreDo you have the building blocks needed to keep up strong digital defenses?
In this newsletter, you’ll find a clear breakdown of cybersecurity concepts, a handy to-do list for securing your accounts, and a spotlight on the latest scams to help you stay one step ahead of cybercriminals.
Read MoreIf you've been following along with this month's series, by now you’ve already heard about the dark web and the deep web, but what about the gray web?
Read MoreWhile the dark web and the deep web may sound similar, the two are vastly different.
In our Micro Training series on the dark, the deep, and the gray web, this week we will be further exploring the deep web and how it works.
Read MoreThe dark web, the deep web, and the gray web—these names may all sound similar, but it’s important to know just how different they are.
Read MoreNow is the perfect time to focus on healthy habits—not just for your body and mind, but also for your digital life, as a cyber-secure online presence can reduce stress and boost productivity.
Read MoreEven your friendly neighborhood Micro Training writers experience cybersecurity incidents, too!
In this week’s Micro Training, one of our writers, Nick, shares his real experience with identity theft and how he navigated the incident.
Read MoreScammers are playing the long game with advanced persistent threat (APT) attacks to stealthily exploit a company and bleed their data dry.
Read MoreWhether you’re a computer whiz or not, its important that we all learn to recognize technical support scams.
In this week’s Micro Training, learn about the tell-tale signs of a technical support scam and how to protect your devices and your wallet.
Read MoreThink one scammer is frightening? Imagine a collective team of scammers working together to defraud their victims.
Read MoreThe National Cybersecurity Alliance has released their annual report!
In this month's newsletter, we'll go over some of their important findings and suggest actionable steps to boost your cybersecurity in the new year.
Read MoreScammers are constantly evolving their tactics, adapting them to different seasonal events to appear more convincing and trustworthy.
Read MoreImagine getting a call from a friend in trouble, begging you to help by sending money via a gift card. It seems urgent, but take a moment to pause and think, as you may be the target of a gift card scam.
Read MoreBeware of mysterious deliveries! Receiving a package you did not order could be a sign of a brushing scam.
In this week’s Micro Training, we explore how brushing scams work, why they happen, and steps you can take to protect your personal information.
Read MoreFrom fraud to computer vulnerabilities, staying proactive and informed is crucial to protecting yourself and your organization. By zooming in on these cybersecurity topics, we will provide practical tips to keep you secure.
Read More