- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- malicious iframes
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Phishing Alerts
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- windows error reporting
- Keep Your Browser Updated to Reduce Threats!
- Crimeware based Targeted Attacks: Citadel case, Part II
- CU Magazine wants your vote for CU Hero
- CommunityAmerica helps members build savings safety net
- CU CEO part of Minn elder fin abuse press conference
- CFPB reported to be considering changes to QM loan fees
- Major changes needed if NCUA stress-testing rule advances: CUNA
- CUNA ready to raise QM issue in latest high-level housing finance reform meetings
- Data breaches could have been avoided: Verizon report
- Mass latest to examine Experian data breach
- Personal Finance: Delete, avoid, hang up on spring scams – The Herald | HeraldOnline.com (press release)
- Senators seek GAO too-big-bank study refinements
- NCUA circulates call report deadline reminder, warning
- CU Social Good marks more than 2,000 ‘Unite for Good’ stories
- As a CU member, it’s easy being green
- Green NCUA highlights mark Earth Day
- NCUF, Filene non-prime auto loan program gives hope on wheels
- White House reps meet with CUNA on GSE reform
- *$[ Payday advance chesapeake. Instant cash advance! Proven. Best. – The Grandstand Gazette (blog)
- Fast online cash advance loans – The Grandstand Gazette (blog)
- Paradise cash advance problems – The Grandstand Gazette (blog)
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.
If you’ve used the Internet for banking or shopping in the last fifteen years, you’ve probably received numerous notifications, warnings, and bits of advice regarding ways to keep your information safe online.Security is fundamental to us at BankSimple, and below we’ve compiled six important tips that can help you independently safeguard your personal and financial data.
Your smartphone is a computer. And it has access to various pieces of data that should be considered private or protected. So what kind of password are you using to protect access to your smartphone? Are you even using a password?
Daniel Amitay, an iPhone developer, did some casual research on what the common iPhone passcodes likely are. Similar to the most common password lists, the results show that most people choose insecure, or easily guessable passcodes.
Out of 204,508 recorded passcodes, the top ten most common were:
The answer, according to top security experts, is a qualified “yes.” Using the Internet to bank, buy music, or shop is still as safe or safer than visiting brick-and-mortar locations, as long as consumers take precautions and know what to do if they notice any suspicious activity.
Over 80% of credit reports have errors on them, errors which could be lowering your credit score and keeping you from getting credit or paying more for it than you should.
Posted in Home | Comments Off
Lifehacker provides a little insight into the thought processes a professional password guesser uses to guess your password. Security expert Roger Grimes writes at InfoWorld how easily passwords can be guessed and says that these days passwords need to be longer than the mere six-to-eight characters typically used.
Consider lengthening your password and including special characters in it. The longer and more random your password is, the harder it is to guess. Lifehacker also provides a list of the most commonly used passwords. Make sure your passwords are not on this list. Also check out the password tips at the bottom this article.
It’s no secret that criminals try to use huge disasters to their benefit to make some cash, this time is no exception! We have been able to track several black hat methods to convince people to "help” Japan’s disaster-affected population. The set of techniques are not new and usually involve:
If you use Facebook, MySpace, LinkedIn, or any Social Networking Community website, you may want to take a closer look at your privacy settings. The US-CERT, (United States Computer Readiness Team), offers some good tips on Staying Safe on Social Network Sites. One important tip is simply recognizing that infomation you post on the web for your friends to read may be open for the world to see.
Posted in Home | Comments Off
The Federal Trade Commission has launched the website and blog for National Consumer Protection Week (NCPW) 2011, to be held March 6-12. The annual event, now in its 13th year, is hosted by the FTC and nearly 30 other government agencies, consumer groups, and national organizations. The website, www.ncpw.gov, provides information about consumer rights, and promotes free resources to help consumers protect their privacy, manage credit and debt, avoid identity theft, understand mortgages, and recognize frauds and scams.