#cybersecuritytips — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cybersecuritytips, aggregated by home.social.
-
Curious what the deal is with #Mastodom accounts like this (a universeodon.com account) on the #Fediverse, that is following 1,900 accounts, has 3,100 following accounts, 0 posts or replies, and is 2 days old. Enabling Approval for Follow Requests helps identify these.
-
Curious what the deal is with #Mastodom accounts like this (a universeodon.com account) on the #Fediverse, that is following 1,900 accounts, has 3,100 following accounts, 0 posts or replies, and is 2 days old. Enabling Approval for Follow Requests helps identify these.
-
Curious what the deal is with #Mastodom accounts like this (a universeodon.com account) on the #Fediverse, that is following 1,900 accounts, has 3,100 following accounts, 0 posts or replies, and is 2 days old. Enabling Approval for Follow Requests helps identify these.
-
Curious what the deal is with #Mastodom accounts like this (a universeodon.com account) on the #Fediverse, that is following 1,900 accounts, has 3,100 following accounts, 0 posts or replies, and is 2 days old. Enabling Approval for Follow Requests helps identify these.
-
Curious what the deal is with #Mastodom accounts like this (a universeodon.com account) on the #Fediverse, that is following 1,900 accounts, has 3,100 following accounts, 0 posts or replies, and is 2 days old. Enabling Approval for Follow Requests helps identify these.
-
DraftKings just faced a breach—not from some sci-fi hack but through the all-too-common tactic of credential stuffing. Reusing passwords made it easy for attackers. How secure are your accounts? Dive in to learn the warning signs and how to protect yourself.
https://thedefendopsdiaries.com/credential-stuffing-lessons-from-the-draftkings-breach/
#credentialstuffing
#databreach
#passwordsecurity
#multifactorauthentication
#cybersecuritytips -
Continuity of Operations - A Bit of Security for June 3, 2025
When should you back up your systems? What should you back up? Listen to this -
https://youtu.be/QYDkZahoAMk
Let me know what you think.
#cybersecuritytips #backup #restore #DR #businesscontinuity #disasterrecovery #BitofSec -
Mastering Cybersecurity: How to Protect Yourself from Phishing and Smishing Scams
1,428 words, 8 minutes read time.
Free Download: Smishing Scam Quick Reference GuideCybersecurity is more important than ever in today’s digital world. As technology continues to evolve, so do the methods cybercriminals use to exploit unsuspecting individuals. One of the most prevalent and dangerous types of cyber attack is phishing—and a particularly sneaky variation, smishing, which targets you via text messages. These scams can lead to significant personal and financial loss, but understanding how they work and knowing how to protect yourself is key to staying safe online.
In this post, we’ll walk through the basics of phishing and smishing, how these scams work, and most importantly, how you can safeguard yourself from falling victim to these deceptive attacks.
1. Understanding Cybersecurity and Why It Matters
Before diving into phishing and smishing scams, it’s essential to grasp the broader concept of cybersecurity. At its core, cybersecurity is the practice of protecting your personal, financial, and sensitive information from cybercriminals, hackers, and malicious software. The goal is to ensure the confidentiality, integrity, and availability of your data, meaning your information should only be accessed by those who are authorized, and it should be kept secure from tampering or loss.
As our world becomes increasingly digital, the threats to our online security also grow. Cybercriminals use a variety of techniques to steal data, gain access to accounts, and commit fraud. Phishing and smishing are two of the most common, and they can have devastating consequences if you’re not vigilant.
2. What is Phishing and Smishing?
Phishing
Phishing is a type of cyber attack where scammers send fraudulent messages—typically through email—that appear to be from a legitimate organization, like your bank, the government, or a trusted online retailer. These messages often include links that lead to fake websites designed to steal your personal information. The emails may claim that you need to update your account information, resolve a billing issue, or confirm a transaction. The goal? To trick you into entering your username, password, or credit card number.
Smishing
Smishing is the SMS (text message) version of phishing. In this scam, cybercriminals send text messages that appear to come from legitimate sources, such as government agencies, toll services, or postal delivery companies. The message will typically inform you of an “unpaid invoice” or a “fee” that requires immediate attention. You’re then encouraged to click on a link that takes you to a fake website, where you may be asked to enter sensitive information.
Both phishing and smishing exploit the same tactics: impersonating a trusted entity, creating a sense of urgency, and directing you to a fake website or form to steal your personal information.
3. How Phishing and Smishing Scams Work
While phishing and smishing may seem like sophisticated attacks, their methods are relatively simple, yet highly effective. Here’s how they typically unfold:
Step 1: You Receive a Message
A phishing or smishing scam begins with a message that appears to come from a familiar, trustworthy source. The email or text might look legitimate because it includes logos, official language, and even your name or other personal details. You might receive a notification claiming there is an unpaid toll fee, an overdue invoice, or a problem with your bank account.
Step 2: You’re Asked to Click on a Link
The message will often contain a link that prompts you to click. This is where the scam turns dangerous. In a phishing email, the link will take you to a fake website that looks nearly identical to a legitimate one. In a smishing text, clicking the link will lead you to a fraudulent page designed to capture your personal information.
Step 3: You Enter Personal Information
If you fall for the scam, you’ll be prompted to enter sensitive data such as login credentials, credit card numbers, or personal identification numbers (PINs). The criminals behind these attacks use this information for identity theft, financial fraud, or selling your data on the dark web.
Step 4: The Scamsters Profit
Once the scammers have your information, they can use it to make unauthorized purchases, steal your identity, or access your financial accounts. In the case of smishing, your phone number might be sold to other cybercriminals, or they may use it to perpetrate additional scams.
4. Red Flags to Look Out For
Phishing and smishing attacks can be incredibly convincing, but there are several warning signs you can look for to help you identify a scam. Here are a few common red flags to watch out for:
- Urgency or Threats: Scammers often create a sense of urgency, claiming that you must act immediately to avoid penalties or lose access to your account.
- Suspicious Links: Always hover over a link to see where it leads. Scammers often use slightly misspelled URLs or obscure domains that look similar to the legitimate website’s domain but are not quite right.
- Generic Greetings: A legitimate organization will address you by name, whereas scammers may use generic greetings like “Dear Customer” or “Dear User.”
- Unusual Requests: Be wary of requests to enter personal or financial information via email or text message. Legitimate companies usually don’t ask for sensitive data this way.
5. How to Protect Yourself from Phishing and Smishing Scams
Protecting yourself from these types of attacks requires vigilance, awareness, and adopting a few simple but effective practices. Here’s what you can do:
a. Never Click on Links in Unsolicited Messages
Whether the message comes by email or text, avoid clicking on any links from unknown or suspicious sources. If you think the message might be legitimate, go directly to the official website or app by typing the URL into your browser.
b. Check the Sender’s Email Address or Phone Number
Scammers often use email addresses or phone numbers that look similar to legitimate ones but have small differences. Verify the sender’s details before responding or taking any action.
c. Enable Two-Factor Authentication (2FA)
Two-factor authentication adds an extra layer of security to your online accounts. Even if a scammer manages to steal your password, they won’t be able to access your account without the second factor of authentication, usually a temporary code sent to your phone or email.
d. Use Strong, Unique Passwords
Always use strong passwords that are difficult to guess and unique for each of your online accounts. Password managers can help you generate and store complex passwords securely.
e. Regularly Update Your Software
Keep your operating system, browsers, and apps up to date. Software updates often include important security patches that protect against new vulnerabilities.
f. Educate Yourself and Stay Informed
Stay up to date with the latest cybersecurity trends and learn about common scams. Knowledge is one of your best defenses against phishing and smishing attacks.
6. What to Do if You’ve Fallen for a Phishing or Smishing Scam
If you’ve clicked on a suspicious link or entered sensitive information, don’t panic. Here’s what you can do:
- Immediately change your passwords for any affected accounts, especially your bank or email accounts.
- Contact your bank or credit card company if you suspect financial fraud, and monitor your accounts for any unauthorized transactions.
- Report the scam to your local authorities or relevant organizations, such as the Federal Trade Commission (FTC) or your country’s cybersecurity agency.
- Run a full antivirus scan on your devices to check for malware or malicious software that may have been installed.
7. Conclusion: Stay Safe and Stay Informed
Phishing and smishing are dangerous but preventable threats. By staying informed, being cautious with your personal information, and using good cybersecurity practices, you can protect yourself from these types of scams.
Remember, always verify any unsolicited messages before taking action. Never let urgency cloud your judgment, and never share sensitive information through email or text messages unless you are 100% sure the source is legitimate.
For more tips on how to protect your digital life, subscribe to our newsletter and stay up to date with the latest cybersecurity advice. Your safety online is only a few simple steps away.
D. Bryan King
Sources
- Cybersecurity & Infrastructure Security Agency (CISA)
- United States Computer Emergency Readiness Team (US-CERT)
- Federal Trade Commission – Identity Theft
- Australian Cyber Security Centre
- SecureWorks Cybersecurity Education
- BBC Technology News
- Help Net Security
- Kaspersky Resource Center
- SANS Institute
- CNBC – Cybersecurity News
- Norton LifeLock Blog
- BrightTalk – Cybersecurity Webcasts
- Digital Trends – Security
- CNET – Tech Services & Software
Disclaimer:
The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.
Related Posts
Rate this:
#avoidPhishing #cybersecurity #cybersecurityAdvice #cybersecurityGuide #CybersecurityTips #digitalSafety #emailProtection #emailScams #emailSecurityTips #fakeWebsites #financialSecurity #howToAvoidSmishing #howToSpotPhishing #identityTheftProtection #internetSecurity #mobileSecurity #onlineFraud #onlineScamProtection #OnlineSecurity #passwordManager #phishingAttacks #phishingDangers #phishingDetection #phishingEmail #phishingEmailsTips #phishingLinks #phishingPrevention #PhishingScams #phishingScamsWarning #phishingWebsite #protectAccountsOnline #protectAgainstPhishing #protectDataOnline #protectingPersonalInformation #safeInternetBrowsing #safeTextMessages #scamAlerts #scamAwareness #scamPreventionTips #secureEmail #secureOnlinePractices #securePasswords #secureYourPhone #securingYourInformation #smishingDangers #smishingDetection #smishingProtection #smishingScams #SMSSecurity #spottingPhishingScams #textMessageScams #TwoFactorAuthentication
-
A Broader View of AI – what Literature can Tell Us.
AI can augment some kinds of work, but it’s not ready to take over anything important yet where human character is concerned. Listen to this -
https://youtu.be/CMTBVvyLdLk
#cybersecuritytips #AI #Thinking #ChatGPTrisks #Literarycriticism #BitofSec -
How Secure are Messaging Services? - A Bit of Security for April 15, 2025
Secure messaging services are vulnerable – but there are things you can do. Listen to this -
https://youtu.be/PUyFspiAbsI
#cybersecuritytips #Signal #securemessaging #SMS #phonesecurity #BitofSec -
🔐 Password Hygiene: Rotating the Wardrobe of Digital Defense #PasswordHygiene #PasswordRotation #SmallBusinessSecurity #Cybersecurity #OpenSource #FreeTools #PasswordManager #KeePassXC #Bitwarden #Passbolt #TwoFactorAuthentication #2FA #Fail2ban #Yubikey #TOTP #OpenSourceSoftware #PasswordStrength #BusinessSecurity #DigitalDefense #SecurityPractices #PasswordPolicy #PasswordManagement #CybersecurityTips #SecurePasswords #BusinessCybersecurity #ITSecurity #OnlineSecurity
-
🔐 Password Hygiene: Rotating the Wardrobe of Digital Defense #PasswordHygiene #PasswordRotation #SmallBusinessSecurity #Cybersecurity #OpenSource #FreeTools #PasswordManager #KeePassXC #Bitwarden #Passbolt #TwoFactorAuthentication #2FA #Fail2ban #Yubikey #TOTP #OpenSourceSoftware #PasswordStrength #BusinessSecurity #DigitalDefense #SecurityPractices #PasswordPolicy #PasswordManagement #CybersecurityTips #SecurePasswords #BusinessCybersecurity #ITSecurity #OnlineSecurity
-
🔐 Password Hygiene: Rotating the Wardrobe of Digital Defense #PasswordHygiene #PasswordRotation #SmallBusinessSecurity #Cybersecurity #OpenSource #FreeTools #PasswordManager #KeePassXC #Bitwarden #Passbolt #TwoFactorAuthentication #2FA #Fail2ban #Yubikey #TOTP #OpenSourceSoftware #PasswordStrength #BusinessSecurity #DigitalDefense #SecurityPractices #PasswordPolicy #PasswordManagement #CybersecurityTips #SecurePasswords #BusinessCybersecurity #ITSecurity #OnlineSecurity
-
The Risks of AI for Detecting Threats - A Bit of Security for March 17, 2025
What is the downside of relying on AI to detect threats? Listen to this -
https://youtu.be/_0AdSztIT9Y
#cybersecuritytips #attachsurface #antimalware #AIsecurity #threatdetection #BitofSec -
The Hedgehog and the Fox E059 - A Bit of Security for March 10, 2025
How complicated is business continuity? It depends on what your idea of a successful recovery is. Listen to this -
#cybersecuritytips #DR #BCP #continuity #continuousoperations #BitofSec -
Cogito Ergo Sum - A Bit of Security for February 24, 2025
Can we use the body as an analogy for cybersecurity? Listen to this -
https://youtu.be/uocWIaYlxWI
#cybersecuritytips #securityengineering #securityanalogy #cybertrust #BitofSec -
Hints and tips for home users - A Bit of Security for February 12, 2025
Here are a few good ideas that will make your home computing a bit safer. Listen to this -
https://youtu.be/yQdnc8mf7yU
Let me know what you think
#cybersecuritytips #phishing #homesecurity #stophackers #BitofSec -
What is Quantum AI? Part II - A Bit of Security for February 4, 2025
Let’s dig a bit more into the possible meaning of Quantum Artificial Intelligence Listen to this -
https://youtu.be/oFYNp65TKI8
#cybersecuritytips #QAI #quantumAI #AI #buzzwordbullshit #BitofSec -
What is Quantum AI? Part I A Bit of Security for February 3, 2025
The buzzword blitz continues with Quantum Artificial Intelligence. This one will take two segments to unwind. Listen to this -
#cybersecuritytips #QuantumAI #AI #Quantumcomputing #buzzwordbullshit #BitofSec -
Security Testing - A Bit of Security for January 28, 2025
We can test for security. Here’s a hint on how to do that. Listen to this -
#cybersecuritytips #testphases #softwaretesting #securitytesting #BitofSec
https://youtu.be/NBBJvM1gvi0 -
On Brakes and Speed
A Bit of Security for January 13, 2025
How is cybersecurity like brakes? How can you use this analogy to persuade leaders about security? Listen to this -
https://youtu.be/bffvTRZ4P2c
#cybersecuritytips #explainingsecurity #securitybusiness #BoDsecurity #whybrakes #BitofSec -
A Bit of Security for January 8, 2025
How does the Board of Directors govern cybersecurity risk? Listen to this -
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #BoD #governance #cybersecuritygovernance #CISO #BitofSec
https://youtu.be/B0pbq3H7kxw -
Applied Futurology
A Bit of Security for December 27, 2024
Here’s how to predict the future, and how to get better at it. Listen to this -
https://youtu.be/MfDsxOvcCug
#cybersecuritytips #futurology #scenaricplanning #strategy #planning #BitofSec -
A Bit of Security for December 16, 2024
Identity Management is converging with Zero Trust. Listen to this - https://youtu.be/gdjheQSs4vc
Let me know what you think!
#cybersecuritytips #idm #zerotrust #zt #identitymanagement #iam #BitofSec -
Inside the SunBurst Attack
A Bit of Security for December 9, 2024
SunBurst has two important lessons for us: supply chain security and security vendor claims. Listen to this -
https://youtu.be/Gu1dFqfzf6s
Let me know what you think!
#cybersecuritytips #supplychainattack #SDLC #softwarebuild #AIforsecurity #BitofSec -
Cybersecurity Business Architecture
A Bit of Security for December 6th, 2024
Tim Brown of SolarWinds described the response to the SunBurst attack. He shows us how to build a high-performance cybersecurity business architecture. Listen to this - https://youtu.be/SEh5WklfQGo
Let me know what you think!
#cybersecuritytips #securityarchitecture #HIPO #BPO #BitofSec -
Axioms for Identity Management E046 2024 12 03
A Bit of Security for December 3, 2024
To make an art into a science, we need to understand core principles. Here’s one for identity management Listen to this - https://youtu.be/8oUwjcK6z-E
Let me know what you think!
#cybersecuritytips #IdM #identitymanagement #IAM #softwareengineering #BitofSec -
Why I Prefer Hardware-based Authentication
A Bit of Security for December 2, 2024
I like hardware-based authentication – when it’s done right. Listen to this -
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #SecureID #hardwaresecurity #authentication #identification #accesscontrol #BitofSec
https://youtu.be/m3vF3knbzHs?si=3-BTKClfspBBzISc -
The Northeast Annual Cybersecurity Summit
A Bit of Security for November 25, 2024
I attended the Northeast Annual Cybersecurity Summit, an exceptional cybersecurity event, last week. Here’s my trip report. Listen to this -
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #securityconference #NEACS #CxOSecurity #BitofSec
https://youtu.be/IuCQ3Oct2XQ?si=7aHPJjxcY1XFFHQP -
Cybersecurity Basics
A Bit of Security for November 20, 2024
Why do we do cybersecurity? Here’s a look at some basic concepts. Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #securitybasics #ISO7498 #confidentiality #integrity #availability #BitofSec
https://youtu.be/QZsuT557dMU -
The Weakest Link Revisited
A Bit of Security for November 13, 2024
My colleague Jonathan Care recently published a piece on the Insider Threat which completes an argument I’ve been working on for quite a while. Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #insiderthreat #weakestlink #securitybugs #UIdesign # #BitofSec
https://youtu.be/l3WgXGYPrug -
The Right to Privacy
A Bit of Security for November 3, 2024
The Right to Privacy in US Law dates to 1890, responding to an invasive new technology. This is a pattern for AI legislation. Listen to this -
https://youtu.be/3isOKcWchCA
Let me know what you think in the comments below. Thank you!
#cybersecuritytips #privacy #AILaw #socialmedia #BitofSec -
Product Security Bad Practices
A Bit of Security for October 25, 2024
The CISA and FBI jointly released a list of Ten Bad Ideas to avoid when you write code. Listen to this - https://www.youtube.com/watch?v=D33p6J3fneU&list=PLL-4otqezHCGah_UWr6FjSdYhvgKqByLF&index=1
Let me know what you think in the comments below.
#cybersecuritytips #safecode #CIE #securebydemand #securebydesign #badcode #BitofSec -
Security Architecture and the Zachman Framework
A Bit of Security for October 14, 2024
An information security architecture avoids many problems and helps fix the ones that get by. Listen to this - https://youtu.be/EEShKxDk96M
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #architecture #zachman #softwareengineering #certification #BitofSec -
Security Governance E039 A Bit of Security for October 5, 2024
What is cybersecurity governance? Why do we bother to govern security, anyway? Listen to this - https://youtu.be/vubXdjEO0Xs
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #governance #toneatthetop #trustworthiness #socialgood #BitofSec -
A Bit of Security for September 25, 2024
Identity and Access Management coordinates two asynchronous processes: the user lifecycle, and the authentication hierarchy. Understanding the vulnerabilities at the many vertices of these processes enables effective identity-centric security. Listen to this -
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #idm #iam #identitymanagement #perimeter # #BitofSec
https://youtu.be/SxYovsvOYEE -
The Evolution of Datology
A Bit of Security for September 18, 2024
Our response to cybersecurity attacks has much in common with larger problem-solving approaches. Listen to this -
Let me know what you think in the comments below or at [email protected]
#cybersecuritytips #datology #cmmi #cisa #resilience # #BitofSec
https://youtu.be/b8NXPgmAJtQ -
Resilience Through Logging E36 2024 09 12
A Bit of Security for September 12, 2024
What value can your logs give you? Listen to this -
Let me know what you think in the comments below!
#cybersecuritytips #logging #BSOD #resilience #RAS #BitofSec
https://youtu.be/qLNjhmbZXEY -
MS Copilot Built my Bio - And It Lied E33 2024 09 05
A Bit of Security for September 5, 2024
Microsoft Copilot is making up biographies for users, and sometimes it gets things really, tragically wrong. Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #libel #AIhallucination #fakebio #BitofSec
https://youtu.be/it_sNUA8o50 -
Ethical hackers share tips on how to protect your crypto - Ethical hackers said that scammers using a fake site called Meetly.gg ha... - https://cointelegraph.com/news/crypto-security-tips-social-engineering #cybersecuritytips #cryptosecurity #ethicalhackers #protectcrypto #avoidscams
-
Console Wars - A Bit of Security for June 24, 2024
Your cybersecurity console is the hub of your incident response capability, and the anchor for your information security program. How well does your vendor listen to your requirements? Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #console #platform #securityplatform #BitofSec
https://youtu.be/NNF5HV4McM8 -
Console Wars - A Bit of Security for June 24, 2024
Your cybersecurity console is the hub of your incident response capability, and the anchor for your information security program. How well does your vendor listen to your requirements? Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #console #platform #securityplatform #BitofSec
https://youtu.be/NNF5HV4McM8 -
Console Wars - A Bit of Security for June 24, 2024
Your cybersecurity console is the hub of your incident response capability, and the anchor for your information security program. How well does your vendor listen to your requirements? Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #console #platform #securityplatform #BitofSec
https://youtu.be/NNF5HV4McM8 -
Console Wars - A Bit of Security for June 24, 2024
Your cybersecurity console is the hub of your incident response capability, and the anchor for your information security program. How well does your vendor listen to your requirements? Listen to this -
Let me know what you think in the comments below.
#cybersecuritytips #console #platform #securityplatform #BitofSec
https://youtu.be/NNF5HV4McM8 -
A Bit of Security for March 20, 2024: Can Cloud Save You Money?
A recent press release suggested that companies could save 250% by migrating to cloud. I was skeptical until I thought a bit more deeply about it. Listen to this - https://youtu.be/Rjq2ZWD7XtM
Let me know what you think in the comments below or at [email protected]
#cloudeconomics #datacenterefficiency #P2V #Migration #BitofSec #cybersecuritytips -
In the latest "Tip of the Week" on Cybercrimeinfo.co.uk, we highlight the unexpected risks of Android password managers. Although these tools are designed to simplify our digital lives, recent studies reveal vulnerabilities that can threaten our security.https://www-ccinfo-nl.translate.goog/tips-trucs-check/1591123_tip-van-de-week-de-onverwachte-risico-s-van-android-wachtwoordmanagers?_x_tr_sl=nl&_x_tr_tl=en&_x_tr_hl=nl&_x_tr_pto=wapp
#CyberSecurity #PasswordManagement #AndroidSecurity #Cybercrimeinfo #DigitalProtection #CyberThreats #TechSecurity #DataLackPrevention #CybersecurityTips #SafePasswords
-
🐴 Are your downloads a gateway for hackers? Uncover the shocking reality of DJVU's Xaro variant ransomware hidden in everyday software. Don't let your digital world be compromised. Learn essential tips to fortify your online safety and outsmart cyber threats. Stay ahead, stay secure! #CyberSecurity #CyberSecurity #RansomwareAwareness #DJVU #Xaro #ransomware #cybercrime #cybersecurityawareness #cybersecuritynews #cybersecuritytips #dataprotection #privacy
-
🐴 Are your downloads a gateway for hackers? Uncover the shocking reality of DJVU's Xaro variant ransomware hidden in everyday software. Don't let your digital world be compromised. Learn essential tips to fortify your online safety and outsmart cyber threats. Stay ahead, stay secure! #CyberSecurity #CyberSecurity #RansomwareAwareness #DJVU #Xaro #ransomware #cybercrime #cybersecurityawareness #cybersecuritynews #cybersecuritytips #dataprotection #privacy
-
🎬 So this scam #2FA app is using custom product pages of Apple Search Ads to trick users. It has different campaigns per search keywords. When searching for "Microsoft Authenticator", it shows screenshots highlighting "Microsoft". and when searching for "Google Authenticator", it highlights "Google". Watch the video 🤯
It's worth noting that custom product pages need to be approved by App Store Connect and Apple Search Ads.
This app steals 2FA secrets and its model is very suspicious as noted below.Friendly reminder: Mastodon uses no algorithms for discovering posts. The only way to spread the word is by boosting posts. If you think this post is helpful, boost it to reach others. Thank you 🙏
#Privacy #Apple #iOS #cybersecuritytips #infosec #cybersecurity #security #2FactorAuthentication -
25 Recon Tools for Hacking & BugBounty 🔎
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #CTF #pwn #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #BugBounty #recon #enumeration #100DaysOfCyberSecurity #CyberSecurityAwareness