tech support scam
Tech support scammers have started using ransomware
Tech support scammers have begun using ransomware to force users to pay for the “cleaning” of their infected computer. Unlike most previous tech support schemes, …
![Tech support scam](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105921/ms-tech-support-scam-400x200.jpg)
Tech support scammers use old bug to freeze browsers
Tech support scammers are exploiting a bug that maxes out users’ CPU and memory capability and effectively freezes the browser and possibly the computer, in an attempt …
![skull binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113205/skull-api-400x200.jpg)
Fight fraud: Scams, identity theft, ransomware attacks
In an increasingly technology-oriented world, cybercrime has become all too common for both consumers and businesses. Internet crime takes many forms and includes everything …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110819/google-chrome-400x200.jpg)
Google Chrome users targeted by tech support scammers
Google Chrome users, beware: tech support scammers are misusing helpful browser features to impersonate Microsoft and to bombard users users with pop-ups. In the first …
![fake tech support isp](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111813/fake-tech-support-isp-400x200.jpg)
Tech support scammers impersonate victims’ ISP
Tech support scammers have switched from cold calls to pop-ups ambushing users online, seemingly coming from the victims’ ISP. In the US and Canada, Verizon, AT&T …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege