Resources

Subscribe to Know Phishing

Guides and How To Articles

Someone Is Watching Me

With smart technology everywhere, you may be surprised to find your TV is watching you!
View

Credit Card Fraud Up 54%

What steps can you take to not be part of the statistics?
View

An Account is Hacked Every 13.5 Seconds

Account Compromise is rising by alarming rates, but you can take steps to stay safe
View

Apple Pay Fraud Text

View

Am I Where I Am Supposed To Be

Find out how Scammers are using Homoglyphs to trick you
View

Hello. And There is The Problem

The Silent Phone Caller - A Very Dangerous Proposition
View

Fake Amazon Product Recall Text

What You Need To Do If You Receive This Text Message
View

Skimmed Again?

Be Careful When Fueling Up - You Might Get Skimmed
View

What's In A Wifi Name?

Does It Matter What I Name My Wifi Network - Apparently It Does
View

Bad Browser Extensions

Browser Extensions That Hurt Rather Than Help
View

Another Data Breach

Another Data Breach to Report - What You Can Do About It
View

AI Used to Create Malware at Lighting Speed

A Cybersecurity firm found that AI was used to create malware in hours in what would have taken weeks
View

USB Tethering

USB Tethering is a safer and faster way to connect on the go.
View

Apple iOS26 Call Screener

With Apple's new iOS update you can have a personal call screener
View

Update or Reboot Devices Often

Reboot and Update your devices to stay as safe as possible
View

Wi-Fi Connected Device Update Checklist

A software update checkist for all devices connected to the internet
View

Special Articles

AI and Its Impact on Cybersecurity: Part 8: Recognizing and Defending Against Phishing Attacks

How does AI help prevent attacks?
View

AI and Its Impact on Cybersecurity: Part 7: AI-Powered Phishing: When Emails Become Weapons

AI Created Phishing Emails
View

AI and Its Impact on Cybersecurity: Part 6: Social Engineering, The Psychologoy of Deception

In this part of our series we look at the psychological tricks scammers use to trick you into giving them what they want
View

AI and Its Impact on Cybersecurity: Part 5: How Algorithms Decide What You See and Pay

View

AI and Its Impact On Cybersecurity: Part 4: Search Engines That Can Read Your Mind

This part talks about how AI has been used in search engines to tailor responses to your searches.
View

AI and Its Impact On Cybersecurity: Part 3 - Your Inboxes Invisible Guardian

Learn how early versions of AI and algorithms protected your inbox
View

AI and Its Impact On Cybersecurity: Part2 A Detailed Look at AI

View

AI and Its Impact On Cybersecurity: Part 1 The AI Explosion - Where Did It Come From?

A History of how AI stared, when it started and who were the people who helped develop it.
View