- Keep Your Browser Updated to Reduce Threats!
- Police warn residents about IRS phone scam – MyCentralJersey.com
- TA16-144A: WPAD Name Collision Vulnerability
- The Provident Bank launches.Bank website and other company news – Allentown Morning Call
- Carding Site Operator Extradited to the US to Face Criminal Charges – Softpedia News
- Weekly analysis – 14th May 2016 to 21st May 2016
- Report: Milwaukee Bucks’ players’ financial information potentially compromised in scam – ProBasketballTalk (blog)
- Toronto vs. Cleveland Game 2 preview: Is there any hope for Raptors? – ProBasketballTalk (blog)
- Report: Brian Shaw offered assistant coaching job under Luke Walton with Lakers – ProBasketballTalk (blog)
- Watch Stephen Curry go flying into stands after loose ball, end up with bump on elbow – ProBasketballTalk (blog)
- Identity Theft: Is Your Information Safe? – 9&10 News
- Preventing social engineering attacks: How credit unions are missing the mark – CUinsight.com (press release)
- Financial Security Tips for Seniors
- Russell Westbrook on Stephen Curry: “He’s not nothing I haven’t seen” – ProBasketballTalk (blog)
- Hackers Steal $81 Million From New York Fed – Credit Union Times
- SB16-137: Vulnerability Summary for the Week of May 9, 2016
- Cybercrime Is Bad For Your Health – Health IT Outcomes (press release)
- Weekly analysis – 7th May 2016 to 14th May 2016
- Chip Shield’s $20 Online Fraud Solution – PYMNTS.com
- Ransomware and Business Phishing Dominate 2016 – Credit Union Times
- Bamboozled: The IRS doesn’t accept iTunes gift cards as payment for overdue taxes – NJ.com
Posted in Home | Comments Off on 5 Ways to Avoid Money Mistakes with your Significant Other
Personal Finances can be difficult. Add a committed relationship to that, and things can get even harder. But with these 5 steps from Consumerist, you can help ensure stability in your financial future.
Have you and your significant other taken any of these steps? Read the full article on Consumerist here.
12.6 million individuals fell victim to Identity Theft in 2012 according to this Javeline report. But what if you’ve become a victim of Identity Theft? What should you do? This Lifehacker article identifies 5 steps that victims of Identity Theft should take, such as contacting the FTC and filing a police report.
When’s the last time you evaluated your passwords? Do you reuse the same password on multiple sites? Choosing a unique, secure password is important, yet many people are still using passwords from this list of 2013’s most common passwords.
Do you see a password you use on this list? If you do, it may be time to reevaluate your passwords.
We all know that saving money can be challenging, and getting started can often be the hardest part. Stephany Kirkpatrick has a list of 8 Small Financial Changes to help you in your savings goals, such as opening a separate savings account and bringing your own lunch to work. Doing these and other small changes can add up to big savings, and can have a large impact on your long-term financial success.
The popular belief among many people is that growing their wealth is a complicated process that requires technical knowledge that is out of their reach. As a result, over 50% of Americans live paycheck to paycheck and 15% are consistently digging themselves further into debt. The good news is that reversing this trend is much simpler than managing complicated financial products on Wallstreet. According to the Free Money Finance blog, building wealth comes down to two simple equations:
Income – spending = surplus
Surplus x time = wealth
What the author is arguing is that many Americans simply spend more than what they make. As a result, no surplus is ever gained and no wealth is accumulated over time. However, carefully managing what you spend compared to what you make will give you a surplus that can start working for you. With some smart and safe investing your savings can start earning you money over time. It may not be immediately gratifying, but it can make a big difference over the long run. Talk to your local credit union and let their advisers help you find a financial investment that works for you so that you too can become wealthy.
Be on the look out for gas pump credit card skimmers. Last month Oklahoma thieves gained $400,000 before they were caught.
The U.S. Attorney’s office in Muskogee, Okla. says two men indicted this month for skimming would rent a vehicle, check into a local hotel and place skimming devices on gas pumps at Murphy’s filling stations located in the parking lots of Wal-Mart retail stores. The fraud devices included a card skimmer and a fake PIN pad overlay designed to capture PINs from customers who paid at the pump with a debit card. Read the whole article on Krebs on Security.
Here are some other articles about how to spot credit card skimmers. Take a look at the pictures in these following articles and be informed:
When’s the last time you evaluated your passwords? Do you reuse the same password on multiple sites? Choosing a secure password is important. Arstechnica has some tips and tricks regarding password safety, as well as software recommendations to help you store your passwords securely.
Posted in Home | Comments Off on Help Protect Yourself from Phishing with Facebook Privacy Controls
When’s the last time you checked your privacy settings on Facebook? If it was more than a few months ago, you might want to check again: Facebook frequently updates how its settings work, so you may inadvertently be sharing information you’d rather keep private.
Consumer Reports has a great how to video that walks you through the Facebook Privacy Settings. Please give it a watch and make sure your settings are how you want them. While you are there, check out Consumer Reports free Guide to Internet security.
Financial news website Quizzle offers up the top 10 myths about credit scores. Take a look and make sure you are informed on what actually affects your credit score and how you can manage it properly. Some of them are common sense, or things you already know, but there might be a few surprises on there too.
Here’s an interesting article from back in September about PIN Numbers. Using a database of exposed passwords as a proxy for PIN Numbers, the researcher does some statistical analysis on the most common and least common PIN Numbers.
Statistically, with 10,000 possible combinations, if passwords were uniformly randomly distributed, we would expect the top twenty passwords to account for just 0.2% of the total, not the 26.83% actually encountered in the database.
The article is filled with many interesting tidbits of number data: The most popular PIN code of 1234 is more popular than the lowest 4,200 codes combined!
Read the article and find out what the most popular and least popular PIN Numbers are. Note, that now that the least popular PINs have been published, bad guys will probably add these to their lists to just give them a try.
Remember to always pick good PIN Numbers for your ATM Cards.
While it might seem convenient that a stranger calling you on the phone claims to have discovered a problem with your computer, beware that this common phone scam is designed to trick you into paying for support you may or may not even need. If you didn’t initiate the support call in the first place, things are probably not as they seem. Even if the caller’s company name sounds familiar, it is a good idea to call them back using the vendor phone number from your own bills or records to initiate contact.
Posted in Home | Comments Off on Update your Antivirus and Software to Protect Your PC
The complexity of computer viruses and malware is increasing every day. Modern exploits simultaneously target multiple vulnerabilities in various technology layers; operating system, web browser, browser add-ons, multimedia extensions and more. Common targets such as Adobe Flash and Oracle’s Java are ripe for exploitation for malicious intent. Stop ignoring those notices that a Java, Flash, Web Browser, Antivirus, or Windows Update is available, and update today. Updates frequently contain patches that close security holes that make your PC susceptible to attack. The most widespread modern computer viruses are spread by what appears to be people you trust, via email, and compromised websites; including friends accounts on popular social networks. Viruses leverage security flaws so effectively that often no user interaction is required. Antivirus software alerts are often the only way you’ll even have a clue your computer security has been compromised. Don’t be a victim, do your computer security a favor and perform your software updates today!