- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hat SEO
- Black Hat USA 2011
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- Comment Spam
- control panel
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Incognit Exploit kit
- Internet Explorer
- Malicious emails
- malicious iframes
- Mass Injection
- Money Laundering
- Monthly Reports
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Nuclear exploit kit
- Phishing Alerts
- Point Of Sale Malware
- POS malware
- Product Information
- QR codes
- Redirect To SMB
- Reverse Engineering
- RIG Exploit Kit
- Rogue AV
- security conference
- Skype spam
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- Threat Report
- Tuesday Patch
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Web Research
- Web spam
- Websense Security Labs
- windows error reporting
- Zeus PIF
- Keep Your Browser Updated to Reduce Threats!
- SB15-110: Vulnerability Summary for the Week of April 13, 2015
- Can You Answer These 3 Financial Questions?
- UN Conference Weighs Efforts to Combat Cybercrime, Create Safer Digital World – AllAfrica.com
- Commissioner notes state CU strength at Calif league rally
- Mortgage loans a ‘bit easier’ to get, CUNA’s Hampel to WaPo
- FHFA says g-fees are at appropriate levels, will continue to monitor
- CUs from all 50 states wanted for Home Depot breach lawsuit
- CUNA files RBC2 comment letter, encourages stakeholders to weigh in
- NCUA budget hearing bill has strong support from CUNA
- Matz to Hensarling: NCUA does not participate in Choke Point
- 62% of world’s adults have access to fin services: World Bank
- Steam Limits Users Who Haven’t Spent $5 to Prevent Spam, Phishing – GameSpot
- Weekly analysis – 11th April 2015 to 18th April 2015
- DOHA: UN conference weighs efforts to combat cybercrime, create safer digital … – UN News Centre
- Cybersecurity’s Weapon of Choice – Corporate Counsel (registration)
- NEW: CUNA files RBC2 comment, urges CU system to be heard
- World Council, Ukrainian group tackle CUs’ challenges
- TROL Act takes positive step, but improvements needed: CUNA
- Millennials cautious, conservative with real estate: CUNA’s Schenk
- A week of Money Smarts kicks off Saturday
Be on the look out for gas pump credit card skimmers. Last month Oklahoma thieves gained $400,000 before they were caught.
The U.S. Attorney’s office in Muskogee, Okla. says two men indicted this month for skimming would rent a vehicle, check into a local hotel and place skimming devices on gas pumps at Murphy’s filling stations located in the parking lots of Wal-Mart retail stores. The fraud devices included a card skimmer and a fake PIN pad overlay designed to capture PINs from customers who paid at the pump with a debit card. Read the whole article on Krebs on Security.
Here are some other articles about how to spot credit card skimmers. Take a look at the pictures in these following articles and be informed:
When’s the last time you evaluated your passwords? Do you reuse the same password on multiple sites? Choosing a secure password is important. Arstechnica has some tips and tricks regarding password safety, as well as software recommendations to help you store your passwords securely.
Posted in Home | Comments Off
When’s the last time you checked your privacy settings on Facebook? If it was more than a few months ago, you might want to check again: Facebook frequently updates how its settings work, so you may inadvertently be sharing information you’d rather keep private.
Consumer Reports has a great how to video that walks you through the Facebook Privacy Settings. Please give it a watch and make sure your settings are how you want them. While you are there, check out Consumer Reports free Guide to Internet security.
Financial news website Quizzle offers up the top 10 myths about credit scores. Take a look and make sure you are informed on what actually affects your credit score and how you can manage it properly. Some of them are common sense, or things you already know, but there might be a few surprises on there too.
Here’s an interesting article from back in September about PIN Numbers. Using a database of exposed passwords as a proxy for PIN Numbers, the researcher does some statistical analysis on the most common and least common PIN Numbers.
Statistically, with 10,000 possible combinations, if passwords were uniformly randomly distributed, we would expect the top twenty passwords to account for just 0.2% of the total, not the 26.83% actually encountered in the database.
The article is filled with many interesting tidbits of number data: The most popular PIN code of 1234 is more popular than the lowest 4,200 codes combined!
Read the article and find out what the most popular and least popular PIN Numbers are. Note, that now that the least popular PINs have been published, bad guys will probably add these to their lists to just give them a try.
Remember to always pick good PIN Numbers for your ATM Cards.
While it might seem convenient that a stranger calling you on the phone claims to have discovered a problem with your computer, beware that this common phone scam is designed to trick you into paying for support you may or may not even need. If you didn’t initiate the support call in the first place, things are probably not as they seem. Even if the caller’s company name sounds familiar, it is a good idea to call them back using the vendor phone number from your own bills or records to initiate contact.
Posted in Home | Comments Off
The complexity of computer viruses and malware is increasing every day. Modern exploits simultaneously target multiple vulnerabilities in various technology layers; operating system, web browser, browser add-ons, multimedia extensions and more. Common targets such as Adobe Flash and Oracle’s Java are ripe for exploitation for malicious intent. Stop ignoring those notices that a Java, Flash, Web Browser, Antivirus, or Windows Update is available, and update today. Updates frequently contain patches that close security holes that make your PC susceptible to attack. The most widespread modern computer viruses are spread by what appears to be people you trust, via email, and compromised websites; including friends accounts on popular social networks. Viruses leverage security flaws so effectively that often no user interaction is required. Antivirus software alerts are often the only way you’ll even have a clue your computer security has been compromised. Don’t be a victim, do your computer security a favor and perform your software updates today!
Small changes can have a drastic effect. US News Money has a neat article on how saving just $2.75 a day can have far-reaching changes on your future financial security. Skip that fancy coffee today and read about how putting that money in the savings jar can make a big difference.
Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. Lifehacker.com has put together 4 security checklists for Passwords, Browsers, Home Network and Public Wi-Fi running the spectrum from the bare minimum you need to do to remain secure all the way up to full tin foil hat mode.
Check out Lifehacker’s Checklists:
- Password Security Checklist
- Browser Security Checklist
- Home Network Security Checklist
- Public Wi-Fi Security Checklist
Posted in Home | Comments Off
“With so many purchases being made online these days — and with more people using credit cards to buy things at retail locations — it’s surprising we don’t hear about massive data breaches every day. But alas, ID theft is an all-too-frequent occurrence, so it couldn’t hurt to know in advance the steps to take to minimize the damage.
The folks at the Federal Trade Commission have created a comprehensive guide called Taking Back: What to do if your identity is stolen [here’s the PDF] that not only provides detailed information but also sample letters, forms and contact info for various private and federal agencies.”