![](https://static.wixstatic.com/media/f3176836a51040aa98b7a0af86b7ff57.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f3176836a51040aa98b7a0af86b7ff57.webp)
![New Scams July 2019](https://static.wixstatic.com/media/f3176836a51040aa98b7a0af86b7ff57.jpg/v1/fill/w_319,h_213,fp_0.50_0.50,q_90,enc_auto/f3176836a51040aa98b7a0af86b7ff57.webp)
New Scams July 2019
Government Imposter Scams We have all received calls or emails purporting to be from some government agency like the social security...
![](https://static.wixstatic.com/media/da73c50a72bc4ea4ba2fb7f20892a464.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/da73c50a72bc4ea4ba2fb7f20892a464.webp)
![New Scams April 2019](https://static.wixstatic.com/media/da73c50a72bc4ea4ba2fb7f20892a464.jpg/v1/fill/w_319,h_226,fp_0.50_0.50,q_90,enc_auto/da73c50a72bc4ea4ba2fb7f20892a464.webp)
New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...
![](https://static.wixstatic.com/media/2db2b7_1f18227e691749dc9d13fc68309d20ea~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/2db2b7_1f18227e691749dc9d13fc68309d20ea~mv2.webp)
![Hacked or Spoofed?](https://static.wixstatic.com/media/2db2b7_1f18227e691749dc9d13fc68309d20ea~mv2.jpg/v1/fill/w_319,h_179,fp_0.50_0.50,q_90,enc_auto/2db2b7_1f18227e691749dc9d13fc68309d20ea~mv2.webp)
Hacked or Spoofed?
Do you know the difference? You may have seen a friend request on Facebook from someone you know and had thought you were already friends...
![](https://static.wixstatic.com/media/d9d4d5bd51ccb54104f074d5891eb7a3.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/d9d4d5bd51ccb54104f074d5891eb7a3.webp)
![Email Flow Rules Help Prevent Scams](https://static.wixstatic.com/media/d9d4d5bd51ccb54104f074d5891eb7a3.jpg/v1/fill/w_319,h_213,fp_0.50_0.50,q_90,enc_auto/d9d4d5bd51ccb54104f074d5891eb7a3.webp)
Email Flow Rules Help Prevent Scams
A popular attack or threat vector for cybercriminals is to send an email pretending to be from a top-level executive or in the case of...
![](https://static.wixstatic.com/media/06e36fe7ffc44ea2ab5a31754293367d.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/06e36fe7ffc44ea2ab5a31754293367d.webp)
![Most Popular Cyber Scams](https://static.wixstatic.com/media/06e36fe7ffc44ea2ab5a31754293367d.jpeg/v1/fill/w_319,h_211,fp_0.50_0.50,q_90,enc_auto/06e36fe7ffc44ea2ab5a31754293367d.webp)
Most Popular Cyber Scams
Cyber scams and online fraud continue to evolve. Law enforcement and cybersecurity professionals try to prevent online fraud by...
![](https://img.youtube.com/vi/T4fSmPHUFbM/mqdefault.jpg)
![Scamming a Scammer](https://img.youtube.com/vi/T4fSmPHUFbM/mqdefault.jpg)
Scamming a Scammer
One of my students decides to take a call from a scammer. What follows is the conversation and remote connection the scammer takes to...
![](https://img.youtube.com/vi/pQHX-SjgQvQ/mqdefault.jpg)
![Student Notes November 2017](https://img.youtube.com/vi/pQHX-SjgQvQ/mqdefault.jpg)
Student Notes November 2017
Don, Since we'd been talking about AI recently in the beginning of class before we get down to the lesson of the day, thought you'd might...