The Job That Wasn't There
How fake recruiters, deepfake interviews, and task scams turn a soft labour market into a fraud pipeline.
Read articleOriginal reporting on fraud, scams, surveillance, security failures, and the mechanics of modern cybercrime.
How fake recruiters, deepfake interviews, and task scams turn a soft labour market into a fraud pipeline.
Read articleHow seventeen million old records were repackaged as a new leak, and why the techniques that produced them still work today.
Read articleHow infostealers turned saved AI logins, session cookies, and agent permissions into a new access economy.
Read articleHow America's fraud hotline quietly became a hunting ground, and whether the machinery is still running.
Read articleA copied Florida statute, a one-letter reply that defeats Apple's last defence, and the rogue tower behind North America's newest smishing wave.
Read articleCaller ID was never designed to be trusted. Scammers have known this for two decades. The phone system is only starting to catch up.
Read articleHow criminals learned to walk through walls — and whether the door is still open. Inside the drive-by download, the attack that needs nothing from you but a page load.
Read articleMalvertising hides malware inside the ads that appear on perfectly legitimate websites. Here is exactly how it works — from millisecond ad auctions to code hidden in the pixels of banner images.
Read articleSmishing has become one of the most profitable digital scams on the planet. Here is the technical pipeline that turns a six-word text into a drained bank account.
Read articleBrowser-in-the-Browser phishing builds a fake login window — address bar, padlock, and all — entirely from web code. The thing you were taught to trust is the attack itself.
Read articleA browser feature warned about in 2011 became a durable scam tool. Fifteen years later, the trap still works wherever old devices and delayed fixes leave the back button exposed.
Read articleHow invisible tracking technology embedded in ordinary email has spent two decades watching you read your messages — and whether it can still be stopped.
Read articleHow the data broker industry collects, packages, and sells everything about you — and why the system is designed to make sure you never get it back
Read articleHow a phone gets turned into a listening device — and why most of us would never know
Read articleIT ISN'T YOUR BANK!
Read articleThe deal is sensitive. Don't loop in anyone else yet.
Read articleHow Fake CAPTCHAs Became the Most Dangerous Thing on the Internet
Read articleHow a silent phone notification became one of the most effective break-in tools in the history of digital crime.
Read articleHow criminals steal phone numbers, drain accounts, and vanish — and why it's still happening right now
Read articleHow billions of your stolen passwords are being tested against your bank account right now — and what the people doing it are charging for the results
Read articleWhy Every Canadian Is Now a Target
Read articleDevice Code Phishing and the Weaponisation of OAuth Authentication
Read articleThe Dual-Purpose Dilemma
Read articleA three-second audio clip is all it takes to clone your voice, and fraudsters are using this technology to devastating effect. From fake kidnappings to corporate heists, AI-powered voice scams are on the rise.
Read articleCriminals are exploiting the convenience of QR codes to steal personal information and money. Here's how to protect yourself from this growing form of fraud.
Read articleConnecting to public Wi-Fi offers convenience, but it also exposes you to security risks. Learn how to protect your data and privacy while using these networks.
Read articleForget symbols and capitalization. Today's password strength hinges on length, uniqueness, and a system-wide approach to security.
Read articleLearn to quickly evaluate emails for phishing attempts using a five-point checklist. Stay ahead of AI-driven tactics and protect your personal information.
Read article