You Searched For "phishing examples" and got 19 results
Sort By:
Top ten phishing tricks that companies are using to test their employees’ cybersecurity smarts
Cyberthreats have grown exponentially as people work from home during the coronavirus pandemic. Mor…
Prabhjote Gill
What is phishing attack and what are the examples of phishing attacks
The advisory has been issued by Indian Computer Emergency Response Team (CERT-In), which is Indi…
Think you can spot a hacker's phishing email? Take Google's quiz and find out
This is why Google and Jigsaw - a security-focused tech incubator owned by Alphabet, Google's paren…
Paige Leskin
Online scams might soon just be a battle between AIs
Harvard Business School researchers say AI could completely automate phishing attacks and reduce th…
Kenneth Niemeyer
India among top three countries facing phishing attacks via WhatsApp and Telegram, reveals report
India is among the top three countries facing phishing attacks primarily via instant mobile messagi…
What is phishing? Here's what you should know about the virtual scamming technique and how to protect yourself from data theft
Phishing is a form of cybercrime wherein emails from fake senders request your personal info. Here'…
Dave Johnson
Email scammers are taking advantage of coronavirus fears to impersonate health officials and trick people into giving up personal information
A scam identified by security firm Trustwave Holdings spreads false claims that the virus has sprea…
Aaron Holmes
Nearly 500 Google users in India were warned of phishing attacks by governments— the number is as high as 12,000 worldwide
If you have received a warning from Google about a possible phishing attack, go back and check agai…
Nobel laureate Robert Shiller ate cat food while doing research for his latest book
In a Q&A with The Wall Street Journal's Jason Zweig discussing his new book "Phishing for Phool…
Myles Udland
Nobel laureate Paul Krugman said he likely fell for a phishing scam. Here's how phishing scams work and how to avoid them.
The incident appears to be an example of a phishing scam, in which scammers pose as an authority or…
Aaron Holmes
None of Google's 85,000 employees have been successfully phished in over a year - and it's because of a simple $20 product anyone can use
Unsuspecting people click on the link in the phishing email and it leads them to a site specially d…
Kif Leswing
Leaked Tesla email reveals the company is warning workers about scammers who might try to trick them with links claiming to have information about the coronavirus
Earlier this year, the coronavirus forced Tesla to briefly close its factory in Shanghai and its st…
Mark Matousek
There's no such thing as a phone that 'cannot be hacked' - the rich and powerful use the same phones as anyone else, and they're just as vulnerable
But there is a common thread between them: They both illustrate how vulnerable the devices we use f…
Lisa Eadicicco
The number of Ozempic and Wegovy scams has grown by 183% so far this year
Scammers are posing as doctors to sell Ozempic and Wegovy weight loss drugs on Facebook and Craigsl…
Kenneth Niemeyer
Scammers are taking advantage of the Ukraine crisis to trick people into donating to fake causes
"Scammers prey on people's kindness and will exploit every opportunity to benefit themselves," said…
Waiyee Yip
Latest COVID-19 email scams target remote workers by citing economic stimulus checks, out-of-office bosses, and health insurance, experts warn
Current business email attacks that target remote workers include emails that purport to be from an…
Jeff Elder
My 9-year-old was sent graphic photos by a stranger. The police told us it happened all the time.
The author's child received a graphic photo on his phone from an unknown number and called her in t…
Heidi Borst
It's not just you: Cybercriminals are also using ChatGPT to make their jobs easier
Phishing and malware attacks could be manufactured with ChatGPT to scam people out of their money o…
Hannah Getahun
A nasty Android malware is spreading using Google's online ad network
The worrying part is how it makes its way to the victim's phone. Researchers from security firm Kas…