- Keep Your Browser Updated to Reduce Threats!
- NCUA Warns of Text Phishing Scam – Credit Union Times
- Prevent Healthcare Phishing by Strengthening Employee Training – HealthITSecurity.com
- Swiss charge 3 suspects in global phishing case – Albany Times Union
- SB16-235: Vulnerability Summary for the Week of August 15, 2016
- Tax refund fraud an increasingly sophisticated crime – Pittsburgh Post-Gazette
- Schools recognized for participation in CyberCamp – Tidewater News
- Weekly analysis – 13th August 2016 to 20th August 2016
- Loudoun Sheriff’s Office warns of scammers demanding iTunes gift cards as payment – Culpeper News and Sports from Culpeper Times
- Loudoun Sheriff’s Office warns of scammers demanding iTunes gift cards as payment – Loudoun Times-Mirror
- Beazley Expert Slated for Virtual Cybersecurity Conference – Credit Union Times
- SB16-228: Vulnerability Summary for the Week of August 8, 2016
- Fraudsters Capitalize On Back to School – Credit Union Times
- Weekly analysis – 6th August 2016 to 13th August 2016
- Stay Safe Online: 5 Security Tips that Help
- 3 Back to Fraud Season Concerns – Credit Union Times
- Government Data Woes: 2016 Compromised Records Surpass Total … – Security Intelligence (blog)
- Prudential plc: Prudential plc – HY16 Results – Risk Factors – The Wall Street Transcript
- Visual Hacking is Successful 91% of the Time – Infosecurity Magazine
- How Hackers Are Going For Gold At Rio’s Olympics | Fast Company … – Fast Company
- Road Rules: How Tesla Plans to Change The Way We Buy Cars – Fast Company
It has always been essential to protect yourself online. However, in the wake of big data collection, the fact that privacy is getting harder to come by and ransomware viruses like the Hitler virus that can hold your computer’s content ransom– staying safe online is even more important.
Retailers and websites aren’t the only entities victimized by hackers and large data breaches.
Medical identity theft is on the rise. In 2015, Blue Cross Blue Shield suffered a hack as three of their largest health insurers were victims of major data breaches with an estimated 92 million records affected. Read more
Posted in Home | Comments Off on Protect Yourself From Credit Card Fraud at Gas Stations
“Consumers typically worry about credit card fraud when making purchases online or conducting ATM transactions, but over the past few years, fraudulent credit card activity has taken the form of gas station scams that use technology to victimize patrons. The key to staying safe is understanding how to protect yourself from identity theft and credit card fraud.”
Are you a “Password Re-user”? Do you use the same passwords for multiple websites?
Think of your password as a key. When you re-use passwords for multiple websites, you are essentially only using 1 key for multiple areas of your online life.
More often senior citizens are the target of financial abuse. A recent study by the American Associate of the Retired Persons (AARP) shows that people age 50 and older are easy targets for financial abuse because they expect honesty in the marketplace and are less likely to take action if they become victims of fraud. Read more
In life emergencies happen. Sometimes we are prepared and sometimes we aren’t. When it comes to potential financial emergencies, we can be prepared. Starting and building an emergency fund is a great way to be prepared and also helps give you more security and peace of mind.
Listed below are 5 ways you can build up your emergency fund:
Life Hacker recently posted a list of the Top 10 Tech Security Basics that Everyone Should Know. Listed below are the top 5: Read more
Privacy policies – most if not all reputable websites have them. Privacy policies are helpful in telling website visitors about which information is being collected and tracked. However, typical privacy policies are long and full of legal jargon that can be overwhelming and dare I say boring to the average website user. Let’s face it, most people don’t ever read them. Read more
Is your computer safe? Did you know that hackers can brute force their way remotely, into your computer? Listed below are the top 10 usernames and passwords to avoid using: Read more
Cybercriminals are becoming more savvy. As a result, security professionals must become more savvy as well, and find better – more efficient ways to circumvent threats.