
Identity Theft: The Vulnerabilities
How does identity theft happen? There are so many ways, but here are a small subset of ways your personal data gets to the scammers and thieves.
Topics about cybersecurity and such
How does identity theft happen? There are so many ways, but here are a small subset of ways your personal data gets to the scammers and thieves.
With COVID-19 out there, the more nefarious are using it to try to inject Banking Malware into your computer, beware!
The worst kind of malware is ransomware. Ransomware takes a hold of your systems and will only give you back some control, after you pay (usually in Bitcoin).
Ransomware can appear on your computer via phishing or spam emails containing attachments. These attachments or links in the content are the ransomware hooks.
Many folks think that phishing and spear-phishing are the same thing, but they are mistaken. One is a specific kind of cyberattack, the other a little more generic.
Even if a site had a link on it that said, Don’t Click That ! I am sure there are a bunch of folks who would still click on it, just out of curiosity. Curiosity killed the cat (after all). At least run the link through a “link check” site! Cyber criminals are always coming up with new ways to use phishing scams to steal your personal information.