Cybercrime evolves quickly, so banks have to move at pace to keep their apps secure. But users have a role to play as well.
Financial exploitation takes many forms, and it often comes from people within an older person’s social circle.
prpicturesproduction/iStock via Getty Images Plus
Artificial intelligence is escalating the battle between spam senders and spam blockers. Recent advances could mean more convincing pitches to get you to click, buy and give up personal information.
Cloning someone’s voice is easier than ever.
D-Keine/iStock via Getty Images
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
QR codes are visual patterns that store data smartphones can read.
AP Photo/Vincent Yu
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
If your gut says something is off about an email message, stop and investigate.
Jose Luis Pelaez Inc/DigitalVision via Getty Images
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
Our critical infrastructures are growing increasingly complex as the number of devices and connections in these systems continues to grow.
(Shutterstock)
If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.