Romance scammers in Ghana charged with more than $100 million in theft
The Department of Justice (DOJ) extradited and indicted 4 Ghanaian nationals for allegedly stealing more than $100 million, mainly through romance scams and business email…
The Department of Justice (DOJ) extradited and indicted 4 Ghanaian nationals for allegedly stealing more than $100 million, mainly through romance scams and business email…
In what seems a phishing attack targeted at a certain audience, scammers are impersonating Netflix and reaching out to marketing staff. The initial mail looks…
Russia is after secret files in the US court system, according to reports this week—and its hackers appear to have reached at least some of…
In the August 2025 patch Tuesday round Microsoft fixed a total of 111 Microsoft vulnerabilities. A few of them are very important for people to…
On July 30, 2025, WinRAR released a new version (7.13 Final) to patch a vulnerability which was used in two separate malware campaigns. WinRAR is…
The next time you shake your head at another online scam and vow that you’d never fall for it, remember that even the most tech-savvy…
Scammers are using the age old tactic of scaring victims into clicking by sending out fake product recall messages from Amazon. The text message tells…
This week on the Lock and Code podcast… The internet is cracking apart. It’s exactly what some politicians want. In June, a Texas law that…
A carmaker’s online dealership portal has been found leaking the private information and vehicle data of its customers. This also meant that anyone with access…
As the use of age verification to access adult websites increases in various countries around the world, shady websites with adult content have started a…
A few weeks ago we warned our readers of a phishing campaign targeting Instagram users that didn’t resort to the usual links to phishing websites,…
At the heart of multiple data breaches against sophisticated and robust companies, including Google, Adidas, Louis Vuitton, and Chanel, was a rudimentary attack method that…