Français

Comment fonctionne l’usurpation de numéro de téléphone?

Comment fonctionne l’usurpation de numéro de téléphone? L’usurpation de numéro consiste à envoyer délibérément de fausses informations pour modifier l’identité de l’appelant. La plupart des usurpations se font à l’aide d’un service VoIP (Voice over Internet Protocol – voix par protocole Internet) ou d’un téléphone IP qui utilise la VoIP ...

Consumer Mobile and IoT Security

The Seven Main Phishing Lures of Cybercriminals

One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, ...

Consumer Mobile and IoT Security

You Rang? New Voice Phishing Attack Tricks Unsuspecting Users

In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to get ahold of personal data and money. With this knowledge, we’ve become smarter and keen to the tricks of the cybercrime trade. However, cybercriminals have become smarter too, and therefore ...

Subscribe to McAfee Securing Tomorrow Blogs