- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- CUNA News
- Data loss
- exploit kit
- exploit kits
- Google News
- Malicious emails
- Mass Injection
- National Credit Union Administration
- Neutrino exploit kit
- Phishing Alerts
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- Keep Your Browser Updated to Reduce Threats!
- Surf safely: Protect yourself from online scams – The Southern
- CUNA Mutual’s Post Shares Retrospective With CU Magazine
- Seven Elected By Acclamation To CUNA Board
- Maryland CU’s Bank Purchase Approved By Shareholders
- CU Activists Discuss ‘Don’t Tax’ Campaign Involvement On Inside Exchange
- CUNA Witness Will Testify On Reg Burden Today
- CUAD: Another Victory In a Line Of Tax Battles
- CFPB Expands Student Loan Oversight Authority
- Kansas CU Association Launches Fin Lit ‘Destroy Debt’ Campaign
- Bank meltdown: We failed admits RBS after ‘Cyber Monday’ computer glitch … – Daily Mail
- NatWest and RBS ‘Cyber Monday’ computer meltdown EMPTIES customers … – Daily Mail
- News Now Top 10 Headlines for Nov
- CUNA Monthly Estimate Show Loan, Savings Increases
- Majority of Maine CUs Help Members with Winter Energy Loans
- Senators Urge CFPB Mortgage Rule Delay
- NCUA: CU Loans, Members, Net Worth All Up in 2013 3Q
- CUNA Launches New Survey Seeking CU Exam Challenges
- CUs Can Watch for Patent Bill, Reg Burden Hearing This Week
- Holiday Sales in Line with CUNA/CFA Findings
- SB13-336: Vulnerability Summary for the Week of November 25, 2013
“Identity theft is a growing a concern, though the roots of ID theft have been strangling us for years.
Now, however, fraudsters have perfected ID theft by connecting dots of consumer information from numerous sources, such as Facebook profiles, cell phone records, snail-mail addresses and e-mail accounts.”
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.
If you’ve used the Internet for banking or shopping in the last fifteen years, you’ve probably received numerous notifications, warnings, and bits of advice regarding ways to keep your information safe online.Security is fundamental to us at BankSimple, and below we’ve compiled six important tips that can help you independently safeguard your personal and financial data.
Your smartphone is a computer. And it has access to various pieces of data that should be considered private or protected. So what kind of password are you using to protect access to your smartphone? Are you even using a password?
Daniel Amitay, an iPhone developer, did some casual research on what the common iPhone passcodes likely are. Similar to the most common password lists, the results show that most people choose insecure, or easily guessable passcodes.
Out of 204,508 recorded passcodes, the top ten most common were:
The answer, according to top security experts, is a qualified “yes.” Using the Internet to bank, buy music, or shop is still as safe or safer than visiting brick-and-mortar locations, as long as consumers take precautions and know what to do if they notice any suspicious activity.
Over 80% of credit reports have errors on them, errors which could be lowering your credit score and keeping you from getting credit or paying more for it than you should.
Posted in Home | Comments Off
Lifehacker provides a little insight into the thought processes a professional password guesser uses to guess your password. Security expert Roger Grimes writes at InfoWorld how easily passwords can be guessed and says that these days passwords need to be longer than the mere six-to-eight characters typically used.
Consider lengthening your password and including special characters in it. The longer and more random your password is, the harder it is to guess. Lifehacker also provides a list of the most commonly used passwords. Make sure your passwords are not on this list. Also check out the password tips at the bottom this article.
It’s no secret that criminals try to use huge disasters to their benefit to make some cash, this time is no exception! We have been able to track several black hat methods to convince people to "help” Japan’s disaster-affected population. The set of techniques are not new and usually involve: