4 Most Common Mobile Attack Channels that Hackers Use

Last week, we discussed email phishing and the red flags you need be aware of. This common yet effective method of harvesting personal data laid the foundation for attacks that target mobile devices. Though many people are aware of phishing email campaigns, not the same can be said about mobile phishing campaigns. Hackers use social […]

Read More…

How to protect your phone number from hackers and port-out scams

In the wake of two-factor authentication frequently being recommended to combat malicious hackers, another security threat has arisen: port-out scams. Port-out scams involve hackers trying to steal your phone number and transfer it to another carrier, allowing them access to any account that requires a text message confirmation to access. Considering many people‚Äôs bank and […]

Read More…