Cyber Threats

Botnets: A Problem Bigger Than One Device
In this on-demand webinar, learn how botnets work and the problems they present, as well as how you can protect your devices from becoming part of one...
Combating Card and E-Skimming
In this on-demand webinar, learn how card and e-skimming works, and how you can protect yourself from falling victim to these schemes.
Spotting Cyber Scam Red Flags
In this on-demand webinar, BlackCloak Education Coordinator Ryan Chiavetta highlights the red flags to look out for when facing potential cyber scams....
"Smishing:" An Intro to Spam Text Message Attacks
In this on-demand webinar, learn about spam text message campaigns launched by cybercriminals, a technique known as "smishing."
Protecting Virtual Meetings From BEC Attacks
BlackCloak Education Coordinator Ryan Chiavetta discusses how cybercriminals have leveraged business email compromise attacks to target virtual meetin...
Protecting Seniors From Scammers
In this on-demand webinar, learn about the common scams cybercriminals deploy to target senior citizens and what you can do to protect them
Facing Off Against Phishing Emails
In this on-demand webinar, learn about phishing emails, including how to spot one and what to do when one of these fake messages land in your inbox.
Common Cyber Scams - Part II
In the next part of our series on cyber scams, we'll examine common scams used by cybercriminals to target you, touching upon schemes over the phone i...
Common Cyber Scams - Part I
BlackCloak examines common scams used by cybercriminals to get you hooked on your mobile and computer devices.
"Vishing:" An Intro to Vocal Phishing Attacks
In this on-demand webinar, learn about phishing attacks that take place over the phone, a practice known as "vishing."
What to Know When Facing Scareware
In this on-demand webinar, learn how scareware works, what to do when facing scareware and how you can protect your devices from being infected in the...
How to Avoid a Man-in-the-Middle Attack
In this on-demand webinar, learn how man-in-the-middle attacks work, and how you can avoid becoming a victim.
Figuring Out Fleeceware
In this on-demand webinar, learn how fleeceware works, and how you can avoid downloading it onto your devices.
What to Know About Questionable QR Codes
In this on-demand webinar, learn how cybercriminals create malicious QR codes and what you can do to protect yourself from falling victim to one.
Robocalls: An Automated Headache
In this on-demand webinar, learn what constitutes a robocall, the measures that have been taken to reduce the volume of robocalls, and what you should...
The Dangers of USB
In this on-demand webinar, learn how cybercriminals have compromised public USB ports, and what you can do to protect yourself from this threat.
How to Spot a Romance Scam
In this on-demand webinar, learn how romance scams work and what you can do to protect yourself from this cyberscam. ```
Why You Should Be Careful Using Public Wi-Fi
In this on-demand webinar, learn about the dangers you expose yourself to when connecting to public Wi-Fi, and how you can protect yourself from these...
Ransomware: The Ever Growing Threat
In this on-demand webinar, learn about the ever-growing threat of ransomware, and what you can do to protect yourself from this cyberattack.
Stopping SIM Hijacking
In this on-demand webinar, learn how SIM hijacking works and how you can protect your devices.
Tackling Tech Support Scams
In this on-demand webinar, learn how tech support scams work and how you can protect yourself from becoming a victim.
Stopping and Responding to Cyberbullying
In this on-demand webinar, learn how the signs your child may have been cyberbullied, and what you can do to protect them.
Stopping 'Say Yes' Scams
In this on-demand webinar, learn about the "Say Yes" scam and what you can do to avoid becoming a victim.
Spotting Fake FEMA Alerts
In this on-demand webinar, learn how to spot potentially fraudulent FEMA emergency alerts.
How to Handle Cyberstalking
In this on-demand webinar, learn what constitutes cyberstalking, and what you can do to both respond to cases of cyberstalking, and the steps you can ...
A Warning About Wrong Number Text Scams
In this on-demand webinar, learn how wrong number text scams work, what cybercriminals are after and how you can protect yourself from becoming a vict...
The Dangers of Bringing Devices to Nation-States
In this on-demand webinar, learn why you shouldn't bring personal devices to authoritative nation-states.
Protecting Yourself From Home Title Theft
In this on-demand webinar, learn how home title theft works, the potential harm victims face, how you can protect yourself from this scam, and what yo...
Curbing Credential Stuffing Attacks
In this on-demand webinar, learn how credential stuffing attacks work, and what you can do to protect your online accounts, including practicing prope...
Pretexting: Identifying Fake Scenarios
In this on-demand webinar, learn how cybercriminals leverage a tactic known as pretexting, and how you can spot it when scammers put it in use.
Fighting Back Against Account Takeovers
In this on-demand webinar, learn about account takeovers, including why cybercriminals want to commandeer your account, how they do so, and what you c...
Battling Brute Force Attacks
In this on-demand webinar, learn how brute force attacks work, and how shoring up your password practices can protect you from becoming a victim.
Deciphering Deepfake Scams
In this on-demand webinar, learn how bad actors leverage deepfake technology to conduct scams, and how you can protect yourself from becoming a victim...
A Warning About Friendly Text Messages
In this on-demand webinar, learn why random, "friendly" text messages can be the leadup to a scam, and why you should delete these messages as soon as...
Fighting Pharming Attacks
In this on-demand webinar, learn how pharming attacks work, and how you can protect yourself from these cyberattacks as you navigate the internet.
Spotting Online Job Scams
In this on-demand webinar, learn why bad actors create fake job listings, what they are after, and how to spot the red flags that will protect you fro...
How to Spot Spoofing Attacks
In this on-demand webinar, learn about the different types of spoofing attacks deployed by cybercriminals, and the red flags you need to know to spot ...
Unmasking CAPTCHA Scams
In this on-demand webinar, learn how bad actors have leveraged CAPTCHA tests to conduct cyber scams, as well as the red flags you need to know to prot...
Cyber Scams to Watch Out For This Summer
In this on-demand webinar, learn about the cyber scams bad actors deploy during the summer season when travel is prevalent, and the ways you can prote...
Too Good to Be True: A Look at Lottery Scams
In this on-demand webinar, learn about how lottery scams work, including the signs you are facing a scam and the steps you can take to ensure you do n...
Challenging Check Fraud
In this on-demand webinar, learn how and why threat actors target your checkbook, and what you should do if you believe you've fallen victim to check ...