From Chapter 7 of Cyber Secure Your Digital Life
0 of 0 completed
Email-based attacks that impersonate trusted organizations to steal credentials or click malicious links.
Phishing via text message. Criminals send fake SMS texts to steal credentials or enable SIM swaps.
Phone-based phishing. Criminals impersonate tech support, banks, or government agencies to extract information.
Phishing via fraudulent QR codes. Criminals place fake QR codes on ads, parking meters, or even replace legitimate ones with their own.
This checklist is from Cyber Secure Your Digital Life by Corey White.
Take the Security Scorecard → Back to Master Checklist →