Phictionary is a guide to phishing attacks with a dictionary twist that exposes real-life examples of scams to help people proactively identify fraudulent communications.
Published ·
Are you active on social media? You could be a target for social media phishing attacks designed to steal your private information.
Published ·
Clone phishing is a technique that scammers use to steal your information. Our guide describes how it works, gives examples, and teaches you how to prevent it.
Published ·
These are the most common phishing email examples with tips on how to identify and avoid them.
Published ·
Learn how to stop spam texts by blocking numbers, reporting scams, using spam filters, and adding your number to a list.
Published ·
There are scammers pretending to sell and buy across digital marketplaces. Learn how to spot common Facebook Marketplace scams so you can avoid them.
As the holidays approach, many of us are feeling the spirit of giving and looking for ways to spread cheer to those less fortunate. But beware! Scammers are lurking, ready to take advantage of good intentions.
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Today’s cybercriminals are more creative than ever, using continually-evolving techniques to worm their way into the computers (and wallets) of unsuspecting victims around the globe.
Constant connectivity to the Internet has improved our lives by leaps and bounds. From booking dinner reservations and buying movie tickets to keeping in touch with long-distance friends and finding the perfect gifts, the web offers a wealth of information.
Want more?
Follow us for all the latest news, tips and updates.