Deepfakes, how to protect ourselves against fraud
Tampered videos, images or audios that purport to show the appearance or voice of a real person and can be used to impersonate.
How to protect yourself when your phone is lost or stolen
Beyond the loss of the device, the real risk is in the stored personal information, which criminals can use to access bank accounts, make unauthorized purchases, or even steal your identity.
How to spot and prevent scams on instant messaging apps
Scams on instant messaging services and platforms are growing in number and being uncovered more often.
What is “spoofing”? How do cyber criminals impersonate public and private organizations?