22 videos

Filters

0:00 04:17:55
Clear
What is Phishing and How to Protect Yourself from it? 06:56

What is Phishing and How to Protect Yourself from it?

"Today we're going to talk about what phishing is and why this form of cyberattack...

2 weeks ago
The danger of social networks 14:26

The danger of social networks

We continue to understand how scammers operate and how to protect yourself from fraudulent schemes...

3 weeks ago
Pavel Belousov, Nadiyno.org: How to avoid falling for the bait of internet scammers? 44:31

Pavel Belousov, Nadiyno.org: How to avoid falling for the bait of internet scammers?

Pavel Belousov, technical lead for the Nadiyno.org digital help hotline, gives recommendations to Internet users:...

4 weeks ago
E-mail is the middle ground between a safe and a dumpster. How to fix it? 29:55

E-mail is the middle ground between a safe and a dumpster. How to fix it?

"Email is one of the oldest and most boring web technologies that most users prefer...

1 month ago
Why is it important to keep your email secure? 01:07

Why is it important to keep your email secure?

The email accounts of executives and employees are the main entry point for hackers into...

3 months ago
When to contact CERT-UA and when to contact the cyber police? 01:59

When to contact CERT-UA and when to contact the cyber police?

How to distinguish phishing from real government programs and where to go in case of...

3 months ago
How to Avoid Becoming a Victim of Phishing 02:41

How to Avoid Becoming a Victim of Phishing

Digital security course: What is phishing

3 months ago
Safe Mode: How to keep your data safe 12:12

Safe Mode: How to keep your data safe

You or someone you know has probably received a call from "bank security officers" at...

3 months ago
Cyberattacks and negligence: lessons for millions of dollars 26:58

Cyberattacks and negligence: lessons for millions of dollars

How to lose data through banal human negligence and carelessness? How to protect yourself? Why...

3 months ago
Harmful advice: watch this video and do the opposite 23:18

Harmful advice: watch this video and do the opposite

Today and only today you have a unique opportunity to refuse to protect your data...

3 months ago
The 5 rules of email security. Save yourself from being hacked 17:30

The 5 rules of email security. Save yourself from being hacked

"The British have a favorite dish - fish and chips, and the Kremlin hackers -...

3 months ago
Phishing: how scammers steal money and data 13:04

Phishing: how scammers steal money and data

One of the most common cyber attacks is phishing. Attackers lure you to a fake...

3 months ago
Phishing attacks: how scammers get your data 12:15

Phishing attacks: how scammers get your data

Phishing is a common form of Internet fraud in which attackers pose as trusted sources...

3 months ago
Your Voice Is Fake! 7 Ways AI Is Tricking You 17:18

Your Voice Is Fake! 7 Ways AI Is Tricking You

Active users of voice and video messages on Telegram are becoming an attractive target for...

3 months ago
Popular Telegram Scams and How to Protect Yourself 11:35

Popular Telegram Scams and How to Protect Yourself

"My niece is taking part in a drawing contest. Please vote for her. Your support...

3 months ago
Your account has been LOCKED! The Instagram scam swamp 11:30

Your account has been LOCKED! The Instagram scam swamp

Every day we risk losing our money due to increasingly sophisticated fraudulent schemes on social...

3 months ago
Paid 50000 UAH and silence. Top cheating schemes in Instagram 13:13

Paid 50000 UAH and silence. Top cheating schemes in Instagram

Every day we risk losing our money due to increasingly sophisticated fraudulent schemes on social...

3 months ago
Prayer and scammers. How they steal money and data in prayer groups. 15:14

Prayer and scammers. How they steal money and data in prayer groups.

In prayer publics, they quote the Bible, publish prayers for all occasions. And they pray...

3 months ago
Scams on the Internet: traps you can easily fall into 15:06

Scams on the Internet: traps you can easily fall into

"Let's figure out how scammers operate and how to protect yourself from fraudulent schemes that...

3 months ago
Cyber police vs. Internet fraudsters. How to combat phishing and identity theft? 18:32

Cyber police vs. Internet fraudsters. How to combat phishing and identity theft?

Phishing and identity theft remain among the most common threats in the digital space that...

3 months ago