Anatomy of a scam
I have received multiple emails requesting that I submit tender documents to various government departments. Suspecting a scam, I did…
productivity through technology
I have received multiple emails requesting that I submit tender documents to various government departments. Suspecting a scam, I did…
Social engineering is any attempt to manipulate a person into revealing personal information with the intent of using that information…
Your digital footprint is the evidence of your activity that is created as you use the Internet. Much of this…
Spyware is a type of malware. The aim of spyware is to collect information about how you use your computer…
Spam is unsolicited electronic messages: it is the “junk mail” of the Internet! Originally referring to emails that you did…
More people are making more frequent use of modern banking methods such as ATMs, online banking and, more recently, banking…
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by…
Catfishing is a prime example of social engineering. Catfishing is defined as “luring (someone) into a relationship using a fictional…
There is a fairly long list of ways in which people commit cybercrimes (crimes committed using computer technology). Some are…