Filters
What is Phishing and How to Protect Yourself from it?
"Today we're going to talk about what phishing is and why this form of cyberattack...
2 weeks agoThe danger of social networks
We continue to understand how scammers operate and how to protect yourself from fraudulent schemes...
3 weeks agoPavel Belousov, Nadiyno.org: How to avoid falling for the bait of internet scammers?
Pavel Belousov, technical lead for the Nadiyno.org digital help hotline, gives recommendations to Internet users:...
4 weeks agoE-mail is the middle ground between a safe and a dumpster. How to fix it?
"Email is one of the oldest and most boring web technologies that most users prefer...
1 month agoWhy is it important to keep your email secure?
The email accounts of executives and employees are the main entry point for hackers into...
3 months agoWhen to contact CERT-UA and when to contact the cyber police?
How to distinguish phishing from real government programs and where to go in case of...
3 months agoSafe Mode: How to keep your data safe
You or someone you know has probably received a call from "bank security officers" at...
3 months agoCyberattacks and negligence: lessons for millions of dollars
How to lose data through banal human negligence and carelessness? How to protect yourself? Why...
3 months agoHarmful advice: watch this video and do the opposite
Today and only today you have a unique opportunity to refuse to protect your data...
3 months agoThe 5 rules of email security. Save yourself from being hacked
"The British have a favorite dish - fish and chips, and the Kremlin hackers -...
3 months agoPhishing: how scammers steal money and data
One of the most common cyber attacks is phishing. Attackers lure you to a fake...
3 months agoPhishing attacks: how scammers get your data
Phishing is a common form of Internet fraud in which attackers pose as trusted sources...
3 months agoYour Voice Is Fake! 7 Ways AI Is Tricking You
Active users of voice and video messages on Telegram are becoming an attractive target for...
3 months agoPopular Telegram Scams and How to Protect Yourself
"My niece is taking part in a drawing contest. Please vote for her. Your support...
3 months agoYour account has been LOCKED! The Instagram scam swamp
Every day we risk losing our money due to increasingly sophisticated fraudulent schemes on social...
3 months agoPaid 50000 UAH and silence. Top cheating schemes in Instagram
Every day we risk losing our money due to increasingly sophisticated fraudulent schemes on social...
3 months agoPrayer and scammers. How they steal money and data in prayer groups.
In prayer publics, they quote the Bible, publish prayers for all occasions. And they pray...
3 months agoScams on the Internet: traps you can easily fall into
"Let's figure out how scammers operate and how to protect yourself from fraudulent schemes that...
3 months agoCyber police vs. Internet fraudsters. How to combat phishing and identity theft?
Phishing and identity theft remain among the most common threats in the digital space that...
3 months ago