Beware of treacherous short messages Fraudulent texts often look as if they have come from a well-known company. How to stay safe from scammers’ tricks. Stay safe
Detect and banish viruses, Trojans, and malware Something is wrong with the computer. How to handle a possible attack and minimize data loss with cool deliberation. How to handle a possible attack
What you need to know about phishing Phishing emails look deceptively genuine. How to know when someone is faking their identity. Important to know
Caller ID spoofing – when callers use a bogus number This scam involves callers who say they are with the police or work for a bank. Protect yourself from criminals using common sense. How to proceed correctly
Identity theft on the Internet – how to act correctly If someone uses your personal data on the Internet, it can be expensive. Read our tips on how to protect yourself from identity theft and how those affected can react appropriately. How to prevent
How to handle email securely If an infected email is simply deleted, nothing can happen. More caution will keep you immune to Trojans and viruses. The basic rules