398 Results for

e-mail scams

Article

Google Apps bug exposes some users' personal info

A defect in Google's business software exposed e-mail addresses, mailing addresses and phone numbers of some users, making them potentially vulnerable to phishing schemes.

By March 13, 2015

Article

Apple billing e-mail scam making the rounds

A rather convincingly official-looking e-mail now in circulation attempts to steal personal information. Here are the telltale signs.

By December 27, 2011

Article

E-mailed malware disguised as group coupon offers on the rise

Spammers take advantage of the rising popularity of e-mailed advertisements by mimicking them and attaching viruses.

By November 13, 2012

Article

Spot and avoid the latest online scams

Among the recent targets of Web criminals are students, renters, and romance-seekers; everyone is at risk though, so keep your defenses up, up, up.

By March 6, 2014

Article

Teen scammed AU$810 for Xbox One photo on eBay

A 19-year-old teenager from Nottingham in the UK spent AU$810 on eBay to buy an Xbox One but was surprised when he only received a printed photo in the mail.

By December 5, 2013

Article

I still don't use anti-virus software. Am I still nuts?

It's been a year since I first revealed my shocking secret. Have I paid the price for ignoring all the security experts?

By June 25, 2014

Article

Phishing scam piggybacks on Apple Dev Center hack

With people no doubt on edge after the hacking of Apple's Web site for developers, scammers are sending out bogus e-mails in an apparent effort to steal passwords.

By July 25, 2013

Article

Fake Malaysia Airlines links spread malware

Don't click that link! Viral Facebook posts with shocking video of Malaysia Airlines MH370 are a scam.

By March 17, 2014

Article

3D printing stock scam, April Fools' joke, or both?

Sketchy-looking 3D printing "company" finds snag in fabric of reality, pulls.

By April 1, 2013

Article

Multifactor authentication extended to all Office 365 users

All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.

By February 10, 2014