In recent years, there have been thousands of data leaks with billions of records

Which include payment data, passport data, names, email addresses, passwords, phone numbers, residential addresses and dates of birth of customers of many companies. For example, in 2020, the passport data… Read more

SIM Swapping: how to lose your phone without letting it out of your hands

The SIM Swapping attack allows a criminal to assign your phone number and gain access to all your accounts. What is a SIM card? SIM stands for Subscriber Identity Module… Read more

How do fraud schemes work and why are victims being targeted?

It’s simple – the attackers put pressure on the greed of people who want to get money literally out of thin air. It looks something like this: The victim receives… Read more

How does Crypto fraud work on Twitter?

If you are part of the crypto community on Twitter or just post tweets related to cryptocurrency in any way, then you probably received suspicious messages or emails. And after… Read more

Forms of digital self-harm

In itself, understandable self-harm can be associated with: poor coping skills; the habit of hiding or suppressing emotions; inability to cope with feelings of stress; a way to get rid… Read more