- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- control panel
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- malicious iframes
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Nuclear exploit kit
- Phishing Alerts
- RIG Exploit Kit
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- windows error reporting
- Zeus PIF
- Keep Your Browser Updated to Reduce Threats!
- Allegacy FCU heart health program saves $150K in employee costs
- Sen Toomey seeks NCUA justifications for higher RBC requirement
- NCUA gives examiners FinCEN guidance for marijuana biz
- Pew Trusts: Prize-linked savings gaining nationwide momentum
- CUNA supports House panel markup of CU relief bills
- SAFE Act, cybersecurity bill to see House floor votes
- Pending home sales witness first drop in 4 months
- Weidler leads Western CUNA Management School graduates
- SB14-209: Vulnerability Summary for the Week of July 21, 2014
- Two-Factor Fraud: Threat of the Week – Credit Union Times
- CUNA BSA training to reach 38 Mich state examiners
- Neb Hike the Hill focuses on reg relief
- McCaskill: RBC proposal means downgrade of 79% of Mo CUs
- CUs differ from banks in approach to subprime auto loans
- Maine league rallies volunteers for Michaud campaign
- House FSC markup of Reg D Study Act set for Tuesday
- Weekly analysis – 19th July 2014 to 26th July 2014
- Debit use bolsters noncash payments, says Fed payments study
- Landmark exam parity bill gets Ill gov signature
- NY young professionals shine in leadership role on Hill
Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. Lifehacker.com has put together 4 security checklists for Passwords, Browsers, Home Network and Public Wi-Fi running the spectrum from the bare minimum you need to do to remain secure all the way up to full tin foil hat mode.
Check out Lifehacker’s Checklists:
- Password Security Checklist
- Browser Security Checklist
- Home Network Security Checklist
- Public Wi-Fi Security Checklist
Posted in Home | Comments Off
“With so many purchases being made online these days — and with more people using credit cards to buy things at retail locations — it’s surprising we don’t hear about massive data breaches every day. But alas, ID theft is an all-too-frequent occurrence, so it couldn’t hurt to know in advance the steps to take to minimize the damage.
The folks at the Federal Trade Commission have created a comprehensive guide called Taking Back: What to do if your identity is stolen [here's the PDF] that not only provides detailed information but also sample letters, forms and contact info for various private and federal agencies.”
It’s vacation season! Hope you are having fun with your family out in the sun. But remember to play it safe. Lock up your house before you leave, and stop the mail and newspaper from being delivered and piling up. Pretty standard, second nature things. But also think about Social Media. Posting that you are on vacation or out of town for an extended period of time on Facebook or Twitter broadcasts that your home is unattended.
Ars Technica has a story about a a couple in South Carolina who used Facebook vacation photos to determine when friends and acquaintances were out of town and took that opportunity to break in and rob the house.
Post your pictures and status updates after you get back.
In case you needed another reminder, your passwords should absolutely not be a single dictionary word. The news that over 8 million user password hashes have been leaked from LinkedIn and eHarmony this week should be enough to convince you stragglers that you should protect yourself by always using strong passwords! And if you’re like us, you’ll also make yourself far less vulnerable by never reusing the same password for multiple sites and services. That helps, because when your password is leaked by a site like LinkedIn, that password can’t be used by hackers to log in to your Facebook, email account, etc on other popular sites to gain more control over your identity. The price of security is often convenience, but you can make it easier on yourself than trying to remember all these passwords by using a password safe like KeePass or PWSafe that can remember them for you, or even automatically type them into websites for you. The time to improve your password security habits is now!
You may also be interested in reading Ars Technica’s article 10 (or so) of the worst passwords exposed by the LinkedIn hack.
Or this article explaining how long it takes to crack passwords based on length.
Posted in Home | Comments Off
Lifehacker has an interesting post about how badguys actually steal your identity and what they do with it once they have it, ranging from opening department store credit cards to securing medical benefits for illegal immigrants. The article also mentions the most important thing you can do is protect your Social Security number. While your SSN isn’t the keys to the kingdom, it is an important piece of your identity that you should protect.
- Read the article at Lifehacker
- Read Lifehacker’s guide to protecting your identity
- How exactly does someone take advantage of knowing your social security number?
Last week NPR broadcasted an interview with life coach and expert organizer Gail Blanke about cleaning up your finances.
For many people, the arrival of Spring might mean cleaning out closets, the garage or the basement. But life coach and expert organizer Gail Blanke says the new season is a great time to tidy up your finances. Host Michel Martin speaks with Blanke about spring cleaning your financial life, which she says might also help get other parts of your life in order.
“Hacked and phished email accounts increasingly are serving as the staging grounds for bank fraud schemes targeting small businesses. The scams are decidedly low-tech and often result in losses of just a few thousand dollars, but the attacks frequently succeed because they exploit existing trust relationships between banks and their customers.”
Posted in Home | Comments Off
In case you’re behind the internet learning curve, this article is a good reminder that you should use unique passwords for different sites. Facebook is a large target, with a shocking number of compromised accounts each day. Don’t make yourself a target by lumping your Facebook authentication into the same basket as your important financial data. Always use strong passwords!
Still using Internet Explorer version 5 or 6? Not sure what version of Internet Explorer you’re using? You can find out by going to “About Internet Explorer” in the “Help” menu of your browser window.
The Internet is always changing and improving. New threats also surface regularly. It is important to keep your browser up to date to ensure a safe, straightforward, and hassle–free experience on the Internet.
We have provided links below to a few of the most popular current browsers.
Available for most platforms including Windows, Mac OS X, and Linux. Very customizable and extensible with Add-ons.
Internet Explorer 8 & 9
More secure and standards–compliant version of Internet Explorer.
An up and coming browser using the same standards compliant WebKit rendering engine as Apple’s Safari.
It renders web pages at lightning speed. It works on iPad, iPhone, iPod touch, Mac, and PC.
What if my computer won’t run these browsers?
Although it might be nice if that computer you bought years ago would keep working the same way forever, that’s just not the online world. The increasing need for better security and the constant improvements in features and capabilities require hardware and software that can keep up…and keep your important financial information safe and secure.
It’s easy to spot Nigerian scams, but an increasing number of credit union members are encountering more sophisticated frauds through email solicitations, phone calls and even text messages. In recent weeks, credit unions like SESLOC Credit Union ($526.7M, San Louis Abispo, CA) have reported that members are continuing to field these phishing scams, with an increasing number that are targeting the elderly. For example, one SESLOC member reported receiving a fake phone call about her grandchild being in police custody in Canada and needing money to be released. Another reported hearing that she’d won a prize by paying her utility bills on time, but she needed to give out her personal information to claim it.