by m.baciucco | Mar 5, 2022
In this pill, we discuss a particularly dangerous cyber technique, spoofing. This scam is making the social engineering activities of cyber criminals increasingly sophisticated. With this technique, a cyber criminal assumes the previously stolen identity of someone we...
by m.baciucco | Feb 14, 2022
Valentine’s Day presents a great opportunity for cyber criminals to make their way into their victims’ wallets instead of their hearts. The goal is to steal personal information, credit card data and personal identities. In what way? With two...
by m.baciucco | Jan 10, 2022
Has the SIM card in your Smartphone stopped working? It may be that you are the victim of a computer scam. The SIM Swap is actually a different scam from all the others, because it manifests itself with the appearance of a problem with the telephone line....
by m.baciucco | Dec 6, 2021
The Internet is the perfect place to shop for Christmas presents, to look for a good bargain or an unusual gift, but it is also the perfect place to organise Christmas holidays. It is also, unfortunately, the ideal place for cyber criminals, who use Christmas as the...
by m.baciucco | Oct 6, 2021
Pharming, a neologism based on the words “farming” and “phishing”, is a very devious technique that substitutes an address on a legitimate website without the victim’s knowledge, and redirects the victim to a malicious site. This can happen without the user realising...