[gtranslate]
Criminal stealing data from an unlocked computer with long URL

Phishing attacks use links of up to 1,000 characters

Phishing attacks use links of up to 1,000 characters A new type of targeted phishing attack has caught the attention of the cybersecurity world in recent days. It’s a phishing

Publicação
Email icon arriving as scams exploiting Gmail

Scams exploiting “dots don’t matter” in Gmail continue

Scams exploiting “dots don’t matter” in Gmail continue Cybercriminals continue to apply phishing and BEC (Business Email Compromise) scams exploiting the fact that “dots don’t matter in Gmail addresses”, using

Publicação
False positive and false negative checkboxes

What are false positive and false negative in information security?

What are false positive and false negative in information security? In the world of information security, false positive is the term used to indicate a file or item that is

Publicação
Cybercriminal attacking with an email impersonation scam and saying that's easy

The trend of email impersonation attacks

The trend of email impersonation attacks Email impersonation attacks are one of the fastest growing types of attacks in the world, reaching out to different markets and companies of all

Publicação
Arrows hitting target right in a target around the world as DDoS attack does

What is a DDoS attack?

What is a DDoS attack? A Distributed Denial-of-Service attack (DDoS) is an attempt to disrupt and block a server, network or service for a limited or unlimited time by overloading

Publicação
Magnifier checking malicious activity involving a marketplace that sold information

After damages of USD 68 million, authorities seize a marketplace involved in the illegal sale of data

After damages of USD 68 million, authorities seize a marketplace involved in the illegal sale of data The FBI, Europol and other US and European agencies announced the seizure of

Publicação
Bomb being armed in a scam involving GoDaddy domains

Scammers hijacked GoDaddy domains to apply bomb threat spam and other attacks

Scammers hijacked GoDaddy domains to apply bomb threat spam and other attacks The spam campaign that demanded payments of USD 20,000 in bitcoin under the threat of blowing up businesses,

Publicação
Free tickets scam in a wall

The threatening and viral scam of free tickets

The threatening and viral scam of free tickets That free ticket message you see circulating on Facebook, Twitter, WhatsApp or any other social media or that you’re receiving in your

Publicação
Mad cybercriminal preparing a bunch of forged email attacks

5 types of forged email attacks

5 types of forged email attacks Forged email, or spoofed email, is a tactic used by scammers to commit fraud. The purpose of an email forgery, as its name implies,

Publicação
A lot of email icon in network parts

What are the parts of an email?

What are the parts of an email? What are the parts of an email? Many people and clients ask us this question and, in fact, that is a good one.

Publicação