- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hat SEO
- Black Hat USA 2011
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- Comment Spam
- control panel
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Incognit Exploit kit
- Internet Explorer
- Malicious emails
- malicious iframes
- Mass Injection
- Money Laundering
- Monthly Reports
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Nuclear exploit kit
- Phishing Alerts
- Point Of Sale Malware
- POS malware
- Product Information
- QR codes
- Reverse Engineering
- RIG Exploit Kit
- Rogue AV
- security conference
- Skype spam
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- Tuesday Patch
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Web Research
- Web spam
- Websense Security Labs
- windows error reporting
- Zeus PIF
- Keep Your Browser Updated to Reduce Threats!
- Weekly analysis – 21st February 2015 to 28th February 2015
- CUNA, Coopera release new toolkit for outreach to Spanish-speaking members
- ‘Patent troll’ hearing furthers conversation on combating abusive demands
- Amias Gerety nominated for Treasury’s asst sec of FIs
- CUNA: Cyberthreat center could be helpful, more needed to address CUs’ concerns
- CUs as public funds depositories high on Fla legislative agenda
- Tweets tell savings story during NCUA Twitter chat
- Bankrate highlights CU affordability vs banks: ‘No surprise,’ says Nussle
- CUNA’s Tiffany: Tips to hasten payment of a long-term mortgage in MainStreetcom
- DHS workers can rely on CUs in case of gov’t shutdown
- McCarthy, Heck visit Calif, Nev CUs
- CUs’ youth fin lit initiatives get FLEC spotlight
- CFPB may temporarily suspend credit card agreement submissions
- Legislators take notice during Wash CU advocate visits
- CUNA continues to press for patent law reforms
- What Can An ID Thief Do With My Social Security Number?
- Ransomware – No Sign of Relief, Especially for Australians
- Calif, Nev wine auction uncorks record $1M for CU4Kids
- America Saves survey: Savings behavior on upswing
- NCUA issues joint agency guidance promoting youth savings programs
Posted in Home | Comments Off
Lifehacker has an interesting post about how badguys actually steal your identity and what they do with it once they have it, ranging from opening department store credit cards to securing medical benefits for illegal immigrants. The article also mentions the most important thing you can do is protect your Social Security number. While your SSN isn’t the keys to the kingdom, it is an important piece of your identity that you should protect.
- Read the article at Lifehacker
- Read Lifehacker’s guide to protecting your identity
- How exactly does someone take advantage of knowing your social security number?
Last week NPR broadcasted an interview with life coach and expert organizer Gail Blanke about cleaning up your finances.
For many people, the arrival of Spring might mean cleaning out closets, the garage or the basement. But life coach and expert organizer Gail Blanke says the new season is a great time to tidy up your finances. Host Michel Martin speaks with Blanke about spring cleaning your financial life, which she says might also help get other parts of your life in order.
“Hacked and phished email accounts increasingly are serving as the staging grounds for bank fraud schemes targeting small businesses. The scams are decidedly low-tech and often result in losses of just a few thousand dollars, but the attacks frequently succeed because they exploit existing trust relationships between banks and their customers.”
Posted in Home | Comments Off
In case you’re behind the internet learning curve, this article is a good reminder that you should use unique passwords for different sites. Facebook is a large target, with a shocking number of compromised accounts each day. Don’t make yourself a target by lumping your Facebook authentication into the same basket as your important financial data. Always use strong passwords!
Still using Internet Explorer version 5 or 6? Not sure what version of Internet Explorer you’re using? You can find out by going to “About Internet Explorer” in the “Help” menu of your browser window.
The Internet is always changing and improving. New threats also surface regularly. It is important to keep your browser up to date to ensure a safe, straightforward, and hassle–free experience on the Internet.
We have provided links below to a few of the most popular current browsers.
Available for most platforms including Windows, Mac OS X, and Linux. Very customizable and extensible with Add-ons.
Internet Explorer 8 & 9
More secure and standards–compliant version of Internet Explorer.
An up and coming browser using the same standards compliant WebKit rendering engine as Apple’s Safari.
It renders web pages at lightning speed. It works on iPad, iPhone, iPod touch, Mac, and PC.
What if my computer won’t run these browsers?
Although it might be nice if that computer you bought years ago would keep working the same way forever, that’s just not the online world. The increasing need for better security and the constant improvements in features and capabilities require hardware and software that can keep up…and keep your important financial information safe and secure.
It’s easy to spot Nigerian scams, but an increasing number of credit union members are encountering more sophisticated frauds through email solicitations, phone calls and even text messages. In recent weeks, credit unions like SESLOC Credit Union ($526.7M, San Louis Abispo, CA) have reported that members are continuing to field these phishing scams, with an increasing number that are targeting the elderly. For example, one SESLOC member reported receiving a fake phone call about her grandchild being in police custody in Canada and needing money to be released. Another reported hearing that she’d won a prize by paying her utility bills on time, but she needed to give out her personal information to claim it.
It’s coming up on that time of the year when you start to see the “End of Year” lists. Mashable has the list of the 25 most common passwords based on SplashData’s records.
Check out the list. If you use any of these passwords you should change it. Also scroll to the bottom of the article for 3 easy tips on picking a better password.
“Identity theft is a growing a concern, though the roots of ID theft have been strangling us for years.
Now, however, fraudsters have perfected ID theft by connecting dots of consumer information from numerous sources, such as Facebook profiles, cell phone records, snail-mail addresses and e-mail accounts.”