- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- control panel
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- malicious iframes
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Nuclear exploit kit
- Phishing Alerts
- Point Of Sale Malware
- POS malware
- RIG Exploit Kit
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- windows error reporting
- Zeus PIF
- Keep Your Browser Updated to Reduce Threats!
- NCUA liquidates Republic Hose Employees FCU
- CUNA Mutual to sell its crop-protection business
- Investment provision bill heads to Mass gov
- Joint cybersecurity venture aims to ID, share info faster for FIs
- CUs’ card programs make the grade for schools
- 68% of businesses unprepared to respond to data breach: Experian/Ponemon
- Fraud, theft, money laundering get CU employees banned from work
- CUNA seeks White House action on cybersecurity
- Nussle in The Hill vows CU tax status defense
- White paper from CUNA Tech Council examines DDoS risk
- Malware in the Wild Abusing “Shellshock” Vulnerability
- 5 Tips To Stop Identity Theft From A Texas A&M University Financial Expert – Texas A&M University
- Deja vu for Supervalu Today: Ohlhausen to talk mobile payments New .bank … – Politico
- NY CUs report strong 2Q lending, membership numbers
- CULAC backs former CU VP Aguilar’s House campaign
- CFPB seeks $475M, charges Flagstar Bank with mortgage servicing violations
- Bank ATM fees continue to climb
- Missouri CUs embrace Bank on More SUV sweepstakes
- CU leagues of 5 states call for merchant breach accountability
- NCUA chair to request second risk-based capital comment period
Still using Internet Explorer version 5 or 6? Not sure what version of Internet Explorer you’re using? You can find out by going to “About Internet Explorer” in the “Help” menu of your browser window.
The Internet is always changing and improving. New threats also surface regularly. It is important to keep your browser up to date to ensure a safe, straightforward, and hassle–free experience on the Internet.
We have provided links below to a few of the most popular current browsers.
Available for most platforms including Windows, Mac OS X, and Linux. Very customizable and extensible with Add-ons.
Internet Explorer 8 & 9
More secure and standards–compliant version of Internet Explorer.
An up and coming browser using the same standards compliant WebKit rendering engine as Apple’s Safari.
It renders web pages at lightning speed. It works on iPad, iPhone, iPod touch, Mac, and PC.
What if my computer won’t run these browsers?
Although it might be nice if that computer you bought years ago would keep working the same way forever, that’s just not the online world. The increasing need for better security and the constant improvements in features and capabilities require hardware and software that can keep up…and keep your important financial information safe and secure.
It’s easy to spot Nigerian scams, but an increasing number of credit union members are encountering more sophisticated frauds through email solicitations, phone calls and even text messages. In recent weeks, credit unions like SESLOC Credit Union ($526.7M, San Louis Abispo, CA) have reported that members are continuing to field these phishing scams, with an increasing number that are targeting the elderly. For example, one SESLOC member reported receiving a fake phone call about her grandchild being in police custody in Canada and needing money to be released. Another reported hearing that she’d won a prize by paying her utility bills on time, but she needed to give out her personal information to claim it.
It’s coming up on that time of the year when you start to see the “End of Year” lists. Mashable has the list of the 25 most common passwords based on SplashData’s records.
Check out the list. If you use any of these passwords you should change it. Also scroll to the bottom of the article for 3 easy tips on picking a better password.
“Identity theft is a growing a concern, though the roots of ID theft have been strangling us for years.
Now, however, fraudsters have perfected ID theft by connecting dots of consumer information from numerous sources, such as Facebook profiles, cell phone records, snail-mail addresses and e-mail accounts.”
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.
If you’ve used the Internet for banking or shopping in the last fifteen years, you’ve probably received numerous notifications, warnings, and bits of advice regarding ways to keep your information safe online.Security is fundamental to us at BankSimple, and below we’ve compiled six important tips that can help you independently safeguard your personal and financial data.
Your smartphone is a computer. And it has access to various pieces of data that should be considered private or protected. So what kind of password are you using to protect access to your smartphone? Are you even using a password?
Daniel Amitay, an iPhone developer, did some casual research on what the common iPhone passcodes likely are. Similar to the most common password lists, the results show that most people choose insecure, or easily guessable passcodes.
Out of 204,508 recorded passcodes, the top ten most common were:
The answer, according to top security experts, is a qualified “yes.” Using the Internet to bank, buy music, or shop is still as safe or safer than visiting brick-and-mortar locations, as long as consumers take precautions and know what to do if they notice any suspicious activity.