Official

Accepted

Unanswered

Advanced Filters

Search Results (120)

Relevance

Closed

Protect yourself from Qshing

This week the Trend Micro Check Team will share knowledge on how to protect yourself from Qshing. Let's start with a quick QR Code 101.    What is QR Code?   QR code or Quick Response Code is a type of matrix barcode or two-dimensional barcode that stores infor

Article

 • PC Security

75

0

Spot the Scam: Home Depot, GroupMe, Amazon, Wells Fargo, Chase, USPS, FedEx, and MORE!

Now that we do most of our activities online, scammers will try to lure us on their Fake sites, Fake online surveys, and Fake Log-in pages to convince us to enter our personal information. This week, the Trend Micro Check Team identified 3 SMS Phishing Scams to help us Spot the Scam!     1

Article

 • PC Security

44

0

Closed

What is Multi-Factor Authentication?

Commonly heard as Two-Factor Authentication, Multi-Factor Authentication (MFA) uses more than one method to verify the identity of a person who is trying to log in to a website.   MFA enabled in Trend Micro Account     Multi-Factor Authentication uses at least two details to

Article

 • PC Security

189

0

Closed

Spot the Scam: HMRC, Bora Bora, Amazon, and TikTok

Check out this week's collection of scams spotted by the Trend Micro Check Team.  Bora Bora Giveaway Scams on Facebook The viral post of Bora Bora getaway scams.  HMRC Tax Refund Text Scam Fake gov.uk page that asks for your personal information and banking details.  Amazon Verification Phishin

Article

 • PC Security

67

1

[Hat Tip] How to Keep Yourself Safe from Cybercrime

As the years go by, cybercriminals have been ruthless in finding new ways to scam or hack users on the Internet. The Internet has become a necessity for many; most of us have become entirely reliant on websites, apps, or emails, so it is no surprise that activities of cybercriminals have evolved as

Article

 • PC Security

114

0

Pinned

Reimagine your cloud journey at #CLOUDSEC2021

Are you a Cloud builder or DevOps professional looking to get the latest insights on hot topics like Infrastructure as Code, Injecting security into the CI/CD pipeline, and fostering a DevSecOps culture? Then CLOUDSEC2021 is for you!    Join us for 3 days of unparalleled brilliance fr

Article

 • PC Security

35

0

Closed

Quantum Computing in the World of Cyber Security

In this modern digital age, computer technologies are creating endless applications associated with every aspect of our day-to-day lives. However, there are still lots of opportunities that dwell beyond the grasp of classical computers. To keep up, we need a new kind of computing that can handle com

Article

 • PC Security

262

2

Closed

Woof, Be Cautious! How Pet Scams Work & Tips to Protect Yourself

  Are you looking for a pet online? Or, have you ever seen a cute puppy for adoption on social media? The demand for pets is on the rise, especially during the COVID-19 pandemic, and so are pet scams! Scammers are trying their best to steal money from potential pet buyers/adopters. Here are som

Article

 • PC Security

54

0

Closed

FlyTrap Android Malware Is Taking Over Facebook Accounts

A new trojan malware found by the security research firm Zimperium hijacks approximately 10,000 Facebook users around the world. Popularly known as the Flytrap Trojan Malware. It targets the open-sourced Android software where users can easily download or install infected apps via third-party app st

Article

 • PC Security

106

1

0

Spot the Scam: 5 SMS & 2 Email Scams of the Week (AT&T, Chase Bank, Scotiabank, Amazon, and More!)

SMS Phishing   SMS Phishing is one of the famous malicious tactics that impersonate known brands, companies, and organizations then send out text messages containing phishing links.   Here are the top SMS phishing scams we observed by our Trend Micro Check Team.   1. AT&T  

Article

 • PC Security

94

0

Closed

Investment Scams: What they are and tips to avoid them

We look for investments to improve our lives, but scammers are just interested in taking our money and personal information to improve their wallets. Have you ever been offered an investment that seemed a little too good to be true? In this article, we’ve gathered some of the most common inves

Article

 • PC Security

37

0

Closed

Online Sports Betting Scams: Don’t Fall for the Scammers’ Tricks!

  Online sports betting is more popular nowadays. It's becoming socially acceptable, especially since people are spending more hours at home because of the Covid-19 pandemic. This week our Trend Micro Check Team will educate us about these Common Tactics & Risks of Sports Betting Scams

Article

 • PC Security

41

0

[Scam Alert] Tedinad.com and Helenabl.com

    Scams are everywhere, from fake ads to fake websites.  Tedinad and Helenabl are scam websites! They claim to be legitimate shops selling outdoor equipment and garden appliances. Here's what our Trend Micro Check Team found out!     Tedinad.com   &nbs

Article

 • PC Security

43

0

0

Closed

Privacy-Enhancing Technologies: What are they and how do these protect your data?

The Internet has become our most preferred medium of communication especially during the pandemic, and as we further utilize the use of the Internet, we become more conscious about our personal data online. With that comes the rising demand for data security and privacy from consumers. Privacy regul

Article

 • PC Security

300

2

How to Watch Porn Safely and Discreetly – 7 Tips

  Tips and Tools to Watch Porn Safely    1. Malware & Porn Malware and porn unfortunately go hand-in-hand. The best way to protect yourself is to install your go-to Antivirus Program.  Trend Micro HouseCall is a free scan and fix tool that protects and cleans up cyber threats

Article

 • PC Security

207

0

Closed

Log4j: The Worst Cyberthreat in a Decade, Affecting Google, Apple, Amazon, Netflix and More!

Log4Shell is a recent bug that is considered the most critical vulnerability risking everyone that uses JavaScript. It is also rated 10/10 by the Apache Software Foundation in its threat score.   This bug can grant cybercriminals easy access to internal networks allowing them to take over a com

Article

 • PC Security

76

0

Closed

Windows Meltdown-Spectre Vulnerability

[What is the Meltdown-Spectre Vulnerability?]Meltdown, designated as CVE-2017-5754, can enable hackers to gain privileged access to parts of a computer’s memory used by an application/program and the operating system (OS). Meltdown affects Intel processors.Spectre, designated as CVE-2017-5753 and CV

Article

104

0

Top Scams and Phishing Schemes of the Week: Netflix, T-Mobile, Amazon, Costco, Louis Vuitton, and Ray-Ban

    Every day, there are emerging scams and schemes that may attack us. You have to be one step ahead of these scammy neighbors. This week, Trend Micro Check found a whole lot of scams you need to watch out.     Netflix   Scammers pretend they are Netflix by claiming there a

Article

 • PC Security

36

0

0

What Is a SIM Swap Scam & How to Stay Protected?

      SIM swapping, SIM jacking, or SIM hijacking, popularly known as SIM swap scam.  In this scheme, scammers trick cellphone providers to transfer someone’s mobile number into their SIM card. They will use this stolen phone number to access the victim’s online accou

Article

 • PC Security

67

0

0

Closed

Spot the Scam: 4 Phishing Scams to be Aware of

As much as we hope scams to disappear completely from our lives, scammers will always find a way to come up with more scams to benefit from people. Among them, phishing scams are spreading ferociously – scammers trying their hardest to ‘phish’ through texts, emails, and social plat

Article

 • PC Security

137

1