Explore an active (as of the date of this article) smishing campaign targeting the rush of online shopping spurred by the holiday season. Uncover the tactics used by cybercriminals (grinches) to manipulate victims into harmful online scams that stink, stank, stunk.
Review the details of a phishing email impersonating Ledger, a popular provider of crypto wallets. Learn to identify these fraudulent emails and protect your assets.
Smishing attacks are on the rise and cybercriminals are leveraging SMS messages to steal data. Learn to spot a smishing attempt and safeguard your organization from these fraudulent texts.
Voice phishing, or vishing, is an increasingly popular scam where attackers use phone calls to trick victims into divulging sensitive information. Uncover the procedures they use and how to verify legitimate callers.
Attackers use stolen credentials in credential stuffing attacks. Learn how this technique works, why reusing passwords is dangerous, and how multi-factor authentication can protect your accounts from takeover.
A pound sized helping of web development to be consumed by new web developers to help them learn how to learn. This fundamental step will make or break a web developers career.
A cup sized helping of web development to be consumed by new web developers to help put into action a set of essential tools and concepts in web development.
A tablespoon sized helping of web development to be consumed by new web developers to help learn a set of essential tools and concepts in web development.