- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Phishing Alerts
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- windows error reporting
- Keep Your Browser Updated to Reduce Threats!
- SB14-069: Vulnerability Summary for the Week of March 3, 2014
- TA14-069A: Microsoft Ending Support for Windows XP and Office 2003
- Fort Credit Union says calls scam – Daily Union
- Verity CU’s bike loans pick up social speed
- Wis league takes CU difference to the airwaves
- CU’s fin lit course makes the grade at Harvard
- NCUA has avenues to MBL relief, CUNA reminds board
- Cheney defines how risk-based capital should look
- CUNA, CUs will explore RBC rule ‘fixes’ in new webinar
- Bethpage FCU small-biz survey grabs media attention
- March 31 is compliance deadline for NCUA emergency liquidity rule
- Top 10 Senior Scams and How to Avoid Them – A Place for Mom Senior Living News and Trends (blog)
- World War III? Cyber, Economic Battles Take Over – Discovery News
- Suppliers Could Be Your Weakest Security Link – Credit Union Times
- CU’s cashless branch featured in crime prevention TV report
- Partnership treats CMN Hospitals with Biz Kid$ DVDs
- NCUA participates in Capitol Hill Consumer Protection Week event
- Toledo Blade columnist hails Nueva Esperanza
- Ga CUs report 6% increase in loans in 2013
- Survey says majority of business owners unconcerned about card security
Posted in Home | Comments Off
In case you’re behind the internet learning curve, this article is a good reminder that you should use unique passwords for different sites. Facebook is a large target, with a shocking number of compromised accounts each day. Don’t make yourself a target by lumping your Facebook authentication into the same basket as your important financial data. Always use strong passwords!
Still using Internet Explorer version 5 or 6? Not sure what version of Internet Explorer you’re using? You can find out by going to “About Internet Explorer” in the “Help” menu of your browser window.
The Internet is always changing and improving. New threats also surface regularly. It is important to keep your browser up to date to ensure a safe, straightforward, and hassle–free experience on the Internet.
We have provided links below to a few of the most popular current browsers.
Available for most platforms including Windows, Mac OS X, and Linux. Very customizable and extensible with Add-ons.
Internet Explorer 8 & 9
More secure and standards–compliant version of Internet Explorer.
An up and coming browser using the same standards compliant WebKit rendering engine as Apple’s Safari.
It renders web pages at lightning speed. It works on iPad, iPhone, iPod touch, Mac, and PC.
What if my computer won’t run these browsers?
Although it might be nice if that computer you bought years ago would keep working the same way forever, that’s just not the online world. The increasing need for better security and the constant improvements in features and capabilities require hardware and software that can keep up…and keep your important financial information safe and secure.
It’s easy to spot Nigerian scams, but an increasing number of credit union members are encountering more sophisticated frauds through email solicitations, phone calls and even text messages. In recent weeks, credit unions like SESLOC Credit Union ($526.7M, San Louis Abispo, CA) have reported that members are continuing to field these phishing scams, with an increasing number that are targeting the elderly. For example, one SESLOC member reported receiving a fake phone call about her grandchild being in police custody in Canada and needing money to be released. Another reported hearing that she’d won a prize by paying her utility bills on time, but she needed to give out her personal information to claim it.
It’s coming up on that time of the year when you start to see the “End of Year” lists. Mashable has the list of the 25 most common passwords based on SplashData’s records.
Check out the list. If you use any of these passwords you should change it. Also scroll to the bottom of the article for 3 easy tips on picking a better password.
“Identity theft is a growing a concern, though the roots of ID theft have been strangling us for years.
Now, however, fraudsters have perfected ID theft by connecting dots of consumer information from numerous sources, such as Facebook profiles, cell phone records, snail-mail addresses and e-mail accounts.”
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.
If you’ve used the Internet for banking or shopping in the last fifteen years, you’ve probably received numerous notifications, warnings, and bits of advice regarding ways to keep your information safe online.Security is fundamental to us at BankSimple, and below we’ve compiled six important tips that can help you independently safeguard your personal and financial data.
Your smartphone is a computer. And it has access to various pieces of data that should be considered private or protected. So what kind of password are you using to protect access to your smartphone? Are you even using a password?
Daniel Amitay, an iPhone developer, did some casual research on what the common iPhone passcodes likely are. Similar to the most common password lists, the results show that most people choose insecure, or easily guessable passcodes.
Out of 204,508 recorded passcodes, the top ten most common were: