-
Account hacked! What to do?
Every bank customer’s nightmare: Criminals gain access to your account and clear it out. If this has already happened, the main thing is damage limitation – and to learn from this.
-
Featured
Ransomware-Game
Further information -
Identity theft
Identity theft (also called identity fraud) is a scam involving someone’s user account – i.e. their identity – being misused by a third party. In the process, attackers either hack a personal account …
-
Social engineering
To obtain confidential information, criminals often abuse the good faith, helpfulness or insecurity of their victims. Whether this involves fictitious telephone calls, fake policemen or phishing - the …
-
Ransomware (encryption Trojans)
Criminals use various strategies to steal money from their unsuspecting victims. One popular approach is to encrypt users’ files, to only grant them access again once a “ransom” has been paid – well …
-
Money Mules (financial agents)
Time and again, criminals are using attractive-looking job offers to recruit people as “money mules”, to transfer criminally obtained funds abroad. Anyone participating in such “deals” is committing …
-
Dubious financial service providers
Brazen financial service providers tempt customers looking to invest with promises of high yields. But such seemingly large profits come with high risks. And sometimes even involve illegal schemes.
-
Threats
Phishing
Further information -
Malware
This article is an introduction to the world of malware. It explains how malware works in general, and also discusses the most common routes of infection and harmful behaviour patterns. In the process …
-
Fraudulent support calls
Criminals don’t just limit themselves to the Internet to obtain confidential information. They increasingly also use the phone. This type of crime is called “vishing”.
Subscribe to our newsletter:
"*" indicates required fields
Copyright © 2024 – All rights reserved. Lucerne School of Information Technologies