Real PayPal invoice to distract you from noticing a scam
How a scammer used a real PayPal invoice as a diversionary tactic to disguise his real intention.
Browsing Category
How the bad guys ‘hack’ the human beings instead of machines. E.g. frauds, scams, impersonations.
How a scammer used a real PayPal invoice as a diversionary tactic to disguise his real intention.
MFA will soon no longer protect you from phishing attacks. A new class of phishing technology will be able to bypass MFA.
Your web-browser window is really at google.com. So, you entered your Google password and 2-step-verification code. You should be safe and secure right? No!
Today, I received this very suspicious LinkedIn InMail message from one of my friend. I smelled that something is quite off. It turned out that she lost $5k!
You saw “facebook.com” with the padlock in the address bar. It can’t be a trick right?
As more people get wiser at detecting phishing attempts by looking at the web address bar, hackers have found a new way to fool people.
One day, your iPhone received an automated call from Apple (complete with Apple’s logo) warning that multiple servers containing Apple user IDs had been compromised and that you needed to call a 1300 number before doing anything else.