Attempts to scam or fool you can happen over almost any form of communication you use—from Skype, WhatsApp, and Slack to Twitter, Facebook, Snapchat, Instagram, and even gaming apps. C
Many of us have received phishing email, either at work or home. These emails look legitimate but are really an attack, attempting to pressure or trick you into taking an action you should not take, such as opening an infected email attachment, sharing yo...
Learning about the myriad threats to your financial, personal, and online well-being is the most powerful way to protect yourself.
This link will direct you to a book about preventing theft - theft of your money and theft of your identity. It is also about protecting your online identity from abuse.