Cryptocurrency users, exchanges and investors suffered $4.5 billion in crypto-related losses resulting from thefts, hacks, and fraud, a CipherTrace report reveals. Cryptocurrency crime losses The lion’s share of those losses stem from the staggering growth of Ponzi schemes, exit scams, and misappropriation of funds crimes, the value of which rose 533 percent year over year….

What Are the Seven Biggest Social Media Scams of 2018?

The massive rise in popularity of social platforms has led to a huge upswing in social media scams — putting a growing pool of users at risk. Facebook had 2.23 billion monthly active users as of the second quarter of 2018, while photo-sharing site Instagram hit 1 billion monthly active users by June 2018, according…

The top 5 dumbest cyber threats that work anyway

The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments on and we shouldn’t try. As it turns out, some hackers are fairly predictable in their successful use of really dumb attacks. Here’s a few.

Tech support scammers and their banking woes

We all know about tech support scams by this point. We know how they cold call, lie their way into your computer, and steal your money. Unfortunately for the scammers, banks know this as well, making it quite difficult at times to maintain an account to store the criminal’s ill-gotten gains. So how does the…

Free Nintendo Switch emulators are fake

Fake emulators for newly released Nintendo console used as bait to get users to fill out survey scams and download potentially unwanted applications. Over the last few weeks, scammers have been trying to dupe users into believing that a software emulator exists for the Nintendo Switch, the company’s newest console that was released on March…

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling admins for decades. Shelves of words have been spilled on the subject, to limited result. Everyone with cybersecurity responsibilities has their own crop of horror stories where an intransigent user has clicked…