Researcher warns of a MacOS vulnerability that Apple refuses to correct

Researcher warns of a MacOS vulnerability that Apple refuses to correct

According to an Italian security researcher named Filippo Cavallarin, macOS Mojave 10.14.5 and younger are vulnerable to a ...
Read More

The Pentagon: Educates the cyber-squire for a world war on a deserted island!

The Pentagon: Few have access to Plum Island in which a secret branch of the US government is located and performs exercises ...
Read More
infosec tweaks

New generation malware and ways of protection: What you need to know

Every day we hear about new attacks by hackers on companies, organizations, and even individuals. The worrying is that the scammers ...
Read More

Google Play Protect protects your device from malware. Turn it on!

Due to the recent vulnerability of WhatsApp that enabled hackers to remotely install spyware on both ...
Read More

Hackers stole sensitive NederWoon customer information

A home rental company, NederWoon, has been hit by hackers. Hackers managed to get into the company's systems ...
Read More
Latest Posts

Four common hacking methods and how to locate them

methodsInternet criminals are constantly finding new ways to gain access to your systems and damage you. The methods they use are many and can have significant economic repercussions. Some of these are:PhishingSmilling, vishing, and pharming. With these methods, they get personal information through your computer or smartphone.

Criminals can then use this information to open bank accounts, rent apartments, and more.

Experts are trying to find ways to deal with these attacks, but new deception methods are constantly coming to light.

Some of the scams you should watch out for are:


It is a method in which criminals send to the victims emails, which are supposed to come from a service, bank, company, or other trusted source, and ask users to provide some information, such as IDs and passwords. In this way they "catch" sensitive information. All people should be aware that such information is not requested through unsafe media, such as emails.

Smishing (for «SMS »)

With this method, criminals send messages to the victim's cell phone. You do not have to give personal information to be at risk. The answer only confirms the validity of your number. Then, your number can be used by other criminals for other purposes.

Vishing (phishing)

Vishing refers to a phone call or a voice automated message that deceives the victim by saying it is from the bank and there is a problem that needs to be addressed. So, scammers ask for personal or account information. It is good to know the numbers of the banks or services you are working with, and to communicate immediately with them when you receive such calls to confirm whether it is true.

How to Identify the Dangerous emails and messages?

  1. Legitimate services and companies never ask to give them personally data via email and messages. Therefore, never give sensitive information when such messages come to you.
  2. The sender may appear to be a valid and reliable source, but may have been spoofed by the criminals.
  3. The "subject" of the email usually refers to something important (eg, something happens to the bank account) to force the user to open it. So be cautious when you see an email with such a subject.
  4. Suspicion can also be seen as the lack of personal greetings (eg "Dear Customer").
  5. Check if the messages you receive have typographical and syntax errors, erroneous punctuation, or something else that looks odd.
  6. Before opening a link, drag the mouse over the link to see if there is a suspected domain suffix.
  7. Call the company to make sure what the email or message says.
  8. Make updates to your anti-virus and anti-spyware.


It refers to the method by which hackers redirect victims to a website that is controlled by them and thus steals user data.

How To Find An Unsafe website;

  1. First, do not open links that are sent to you via email. First type this link in the browser.
  2. Check to see if there is any contact information or any information that certifies its legality. Try communicating with its managers to make sure.
  3. Please check the address carefully URL. Many times, criminals make a very small change to the URL so that it is not readily perceived.
  4. Check the "properties" of the links. To check them, right-click on a link and select 'Properties'. There you can see the actual destination of the link.
  5. Generally, take advantage of the security tools your browser offers and make constant updates. Browsers have special filters to help diagnose problems and warn you.

The methods used by hackers there are many and you should always be on the lookout.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *