-
Account hacked! What to do?
Every bank customer’s nightmare: Criminals gain access to your account and clear it out. If this has already happened, the main thing is damage limitation – and to learn from this.
-
Threats
Phishing
Further information -
Malware
This article is an introduction to the world of malware. It explains how malware works in general, and also discusses the most common routes of infection and harmful behaviour patterns. In the process …
-
Dubious financial service providers
Brazen financial service providers tempt customers looking to invest with promises of high yields. But such seemingly large profits come with high risks. And sometimes even involve illegal schemes.
-
Ransomware (encryption Trojans)
Criminals use various strategies to steal money from their unsuspecting victims. One popular approach is to encrypt users’ files, to only grant them access again once a “ransom” has been paid – well …
-
Don’t give Harold Hacker a chance to scam you!
Harold Hacker wants your money. He is using ever more cunning means to obtain access to your e-banking facility. Learn how to effectively protect yourself!
-
Investment fraud
“Investment fraud” involves fraudulent investments. To this end, brazen financial service providers lure customers willing to invest with promises of high yields. Yet above all, those supposedly large …
-
Denial-of-Service attack
A denial-of-service attack aims to prevent access to a server or website. E-banking users can be affected, but also unwittingly involved in such attacks. Protect yourself!
-
Social engineering
To obtain confidential information, criminals often abuse the good faith, helpfulness or insecurity of their victims. Whether this involves fictitious telephone calls, fake policemen or phishing - the …
-
Money Mules (financial agents)
Time and again, criminals are using attractive-looking job offers to recruit people as “money mules”, to transfer criminally obtained funds abroad. Anyone participating in such “deals” is committing …
Subscribe to our newsletter:
"*" indicates required fields
Copyright © 2023 – All rights reserved. Lucerne School of Information Technologies