Skip to Main

Updates

Multi-Factor Fatigue

 

A cyberattack gaining in popularity is “multi-factor fatigue,” which describes incessant fraudulent push notifications sent to the owner of a compromised account.

Bluebugging

 

Bluebugging occurs when a hacker exploits a vulnerability or weakness in a Bluetooth connection. They accomplish this through tools and software that can detect Bluetooth devices in proximity with vulnerable connections.

Deepfake

 

Deepfake refers to a video, photo or voice clone that is created using artificial intelligence (AI). AI can be used to replicate images, speech patterns and mannerisms to manipulate depictions of people and events. Threat actors can use this technology to spread misinformation, cause disruption, and erode trust.

Fake Error Messages

 

Cybercriminals create fake error messages to lure users into installing malware while web browsing or opening a document.

Zombie Apps & Accounts

 

Zombie apps and accounts are forgotten online services that endanger your privacy, clutter your phone, and drain your battery.

Password Spraying

 

Password spraying involves an attacker placing a list of potential usernames in a program and trying a common or default password against the list of usernames.

Digital Footprint

 

Your digital footprint is any tidbits of information you leave about yourself online. Those comments, pictures, and posts on social media form a picture about you.

Online Donations

 

It is easier than ever to support the charity of your choice with online donations. It is also easier than ever for scammers to masquerade as a charity and take advantage of those who want to help in a disaster. Spotting fake charity campaigns can be difficult.

Typosquatting

 

Typosquatting targets internet users who incorrectly type a URL into their web browser.