MUO

Phishing

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

A man sitting at a table and browsing a website on his laptop. 1
5 Red Flags to Identify a Phishing Website

Phishing isn't just for email or social media—you can also land directly on a phishing website. Here are some of the top indicators.

By 
Several Spam and Phishing Attempts Over Gmail Logo 1
9 Examples of Fraud and Phishing Emails to Watch Out For

How can you spot a phishing email? Here are the numerous types of fake messages you need to be wary of.

By 
Duolingo icon in 3D 1
Were You Hit by the Duolingo Data Breach? Here’s What to Do Next

The language-learning app, Duolingo, was hacked, so cybercriminals might have access to your name and location. Here's why that matters.

By 
hooded man in dark alley holding spherical light 1
Is Your Private Information on the Dark Web?

Is your personal data on the dark web, being traded around by cybercriminals? Here's how to find out, and why your info is so valuable.

By 
An android phone placed on top of a keyboard 1
6 Security Threats Android Users Face in 2023

Your Android smartphone faces a lot of problems courtesy of cybercriminals. Here's what to watch out for right now.

By 
Wave browser logo on black background 1
What Is Wave Browser? Is It a Virus?

Yes, Wave is a genuine browser, but that doesn't mean it's not malicious too. Here's what to do if you've accidentally installed this service.

By 
a fishing hook in a blue sea, grabbing onto bitcoin logo 1
Don’t Let the Elon Musk “Freedom Giveaway” Crypto Scam Swindle You

Been added to a Twitter list, supposedly by Elon Musk, promising a "Freedom" giveaway? It's a scam. Here's everything you need to know.

By 
cogs interacting against a purple screen 1
What Is Data Exfiltration? How Can You Stop It Happening to You?

It doesn't matter if your system carries lots of data or a small amount of it: you need to protect it from many threats, including hacks and phishing.

By 
dark-web-sites 1
How to Find Active .Onion Dark Web Sites (And Why You Might Want To)

The dark web consists of .onion sites hosted on the Tor network. How do you find them and where do you go?

By 
A pink present tied with a golden ribbon sitting on a table. 1
Why You Shouldn't Trust Giveaway Contests on Social Media

If it seems too good to be true, it probably is—and that applies doubly to social media. Here are the signs of a giveaway scam.

By 
closeup shot of fake money and scam letters on table 1
What Is the Geek Squad Email Scam? How to Avoid It

Have you received an email from Geek Squad confirming a transaction that you haven't placed? This might be a scam. Here's what to do.

By 
An image with HTTPS written on it in green with a green padlock icon 1
What Is HTTPS Spoofing?

Most of us trust the padlock we see next to a URL that begins with "https", but cybercriminals have found a smart way to exploit this.

By 
Mockup of Laptop Showing Pop-up of McAfee Fake Subscription Expiry 1
What Is the McAfee Virus Pop-Up Scam? How to Get Rid of It

Have you seen a pop-up informing you that your McAfee subscription has expired? It might be a fake. Here's what you need to know.

By 
Desktop Monitor Placed on a Table Showing Image of a Man Viewing From a Binocular Covered With Facebook Logo Icons 1
Is the "Facebook Protect" Email From "Security@facebookmail.com" Legitimate?

Have you received an email saying you need to use advanced security via Facebook Protect? You might think it's a scam. Here's how to tell.

By 
open padlock with key beside it 1
Passwords vs. Passkeys: What Are the Differences?

We all use passwords for online accounts, but could they soon become a thing of the past? If so, what are passkeys, their natural successor?

By 
digital threats causing financial loss graphics 1
Can You Spot Phishing Emails? Test Your Awareness With These Quizzes

Phishing emails are becoming harder to spot, but these quizzes test your phishing knowledge and help you stay safe.

By 
Hands exchanging wads of currency bills 1
What Is a Quid Pro Quo Attack? How Can You Protect Yourself?

You've likely heard the term "quid pro quo", but did you know there are also cyberattacks that go by the same name?

By 
cybercriminal looking at duolingo app 1
Here's Why You Shouldn't Trust Emails From Duolingo

Have you got an email from Duolingo? It could be a scam—especially since private data has been leaked to hackers. Ça alors !

By 
 1
How to Trace Emails Back to Their Source IP Address

Here's how to trace that email back to where it came from... and why you'd want to do it!

By 
cybercriminal posing as a bank representative 1
What Is Blagging in Cybersecurity?

Anyone can be tricked by a blagger. Here's what that involves and how you can defend yourself.

By 
See more articles +