50+ Phishing Email Examples from Real Life Phishing Attacks (2009-2020)

In a previous post, I classified the endless phishing varieties into 3 broad categories based upon the end goal of the phishing scam. Those were the credential-based, action-based, and malware-based phishing scams. Here in this post, I have sorted under these 3 categories a meticulously curated list of actual examples of phishing emails that I …

50+ Phishing Email Examples from Real Life Phishing Attacks (2009-2020) Read More »

What is Two Factor Authentication (2FA) & Why You Should Start Using it Right Away

If you have at least one very high-value online account that is protected ONLY by a password, then allow me to introduce you to two-factor authentication. Because it might just be what would save that account from being hacked or hijacked in the near future. (It’s a matter of when). Two-factor authentication (also known as …

What is Two Factor Authentication (2FA) & Why You Should Start Using it Right Away Read More »

Password Manager: Easily Store, Use and Protect All Your Passwords – from Hackers

Quite a lot has been said about using a password manager on the internet in general. Yet, it still remains a relatively under utilized solution by the larger section of internet users. And when it comes to password security, the role of a password management solution cannot be overemphasized. The solution to forgetting your passwords …

Password Manager: Easily Store, Use and Protect All Your Passwords – from Hackers Read More »

Scroll to Top