-
Account hacked! What to do?
Every bank customer’s nightmare: Criminals gain access to your account and clear it out. If this has already happened, the main thing is damage limitation – and to learn from this.
-
Featured
Ransomware-Game
Further information -
Fraudulent support calls
Criminals don’t just limit themselves to the Internet to obtain confidential information. They increasingly also use the phone. This type of crime is called “vishing”.
-
Threats
Phishing
Further information -
Ransomware (encryption Trojans)
Criminals use various strategies to steal money from their unsuspecting victims. One popular approach is to encrypt users’ files, to only grant them access again once a “ransom” has been paid – well …
-
Drive-By Download
Simply visiting an infected website is sufficient to infect your device. Websites affected often contain reputable offers and have been compromised beforehand to distribute malware. But you can …
-
Malware
This article is an introduction to the world of malware. It explains how malware works in general, and also discusses the most common routes of infection and harmful behaviour patterns. In the process …
-
Social engineering
To obtain confidential information, criminals often abuse the good faith, helpfulness or insecurity of their victims. Whether this involves fictitious telephone calls, fake policemen or phishing - the …
-
Identity theft
Identity theft (also called identity fraud) is a scam involving someone’s user account – i.e. their identity – being misused by a third party. In the process, attackers either hack a personal account …
-
Malware infection
Anti-virus software and automatic updates of your operating system are crucial to be able to surf the Internet safely. Still it can happen that a computer becomes infected with malware. You must …
Subscribe to our newsletter:
"*" indicates required fields
Copyright © 2024 – All rights reserved. Lucerne School of Information Technologies