-
Account hacked! What to do?
Every bank customer’s nightmare: Criminals gain access to your account and clear it out. If this has already happened, the main thing is damage limitation – and to learn from this.
-
Threats
Phishing
Further information -
Drive-By Download
Simply visiting an infected website is sufficient to infect your device. Websites affected often contain reputable offers and have been compromised beforehand to distribute malware. But you can …
-
Don’t give Harold Hacker a chance to scam you!
Harold Hacker wants your money. He is using ever more cunning means to obtain access to your e-banking facility. Learn how to effectively protect yourself!
-
Social engineering
To obtain confidential information, criminals often abuse the good faith, helpfulness or insecurity of their victims. Whether this involves fictitious telephone calls, fake policemen or phishing - the …
-
Investment fraud
“Investment fraud” involves fraudulent investments. To this end, brazen financial service providers lure customers willing to invest with promises of high yields. Yet above all, those supposedly large …
-
Dubious financial service providers
Brazen financial service providers tempt customers looking to invest with promises of high yields. But such seemingly large profits come with high risks. And sometimes even involve illegal schemes.
-
Malware
This article is an introduction to the world of malware. It explains how malware works in general, and also discusses the most common routes of infection and harmful behaviour patterns. In the process …
-
Malware infection
Anti-virus software and automatic updates of your operating system are crucial to be able to surf the Internet safely. Still it can happen that a computer becomes infected with malware. You must …
-
Money Mules (financial agents)
Time and again, criminals are using attractive-looking job offers to recruit people as “money mules”, to transfer criminally obtained funds abroad. Anyone participating in such “deals” is committing …
Subscribe to our newsletter:
"*" indicates required fields
Copyright © 2023 – All rights reserved. Lucerne School of Information Technologies