- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- control panel
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- malicious iframes
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Nuclear exploit kit
- Phishing Alerts
- Point Of Sale Malware
- POS malware
- RIG Exploit Kit
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Web spam
- Websense Security Labs
- windows error reporting
- Zeus PIF
- Keep Your Browser Updated to Reduce Threats!
- Beware of income tax scam making the rounds – Alexandria Town Talk
- Times Square billboard thanks CUs for CMN Hospitals support
- Chicago Tribune column: CU membership worth the switch
- Ill reg settlement returns $16M to CUs in fee credits
- Leagues, CUs batten down hatches for NE blizzard
- RBC2 changes, improvements, outlook detailed in CUNA webinar
- Fed unveils strategies for US payments system improvements
- Data security, breach hearings highlight this week in Congress
- Hybrids ‘dominate’ ARM offerings: Freddie survey
- Flash forward – Angler, here we come
- 25 Worst Passwords of 2014
- Obama, Modi pledge cyber cooperation DHS OIG takes public stand against … – Politico
- SB15-026: Vulnerability Summary for the Week of January 19, 2015
- World Council shares 12 tactics to reach Gen Y globally
- CU tax-help programs ready for new healthcare questions
- LinkedIn group a home for new bank-to-CU employees
- CUNA, Defense CU Council meet with CFPB on CU exemption from lending changes
- Act fast: Don’t miss today’s webinar on RBC2 impact, continuing concerns
- Kenyan CUs intersect with Gates’ vision to alleviate poverty
- More than 90% of 2014 data breaches were preventable, report says
Last week NPR broadcasted an interview with life coach and expert organizer Gail Blanke about cleaning up your finances.
For many people, the arrival of Spring might mean cleaning out closets, the garage or the basement. But life coach and expert organizer Gail Blanke says the new season is a great time to tidy up your finances. Host Michel Martin speaks with Blanke about spring cleaning your financial life, which she says might also help get other parts of your life in order.
“Hacked and phished email accounts increasingly are serving as the staging grounds for bank fraud schemes targeting small businesses. The scams are decidedly low-tech and often result in losses of just a few thousand dollars, but the attacks frequently succeed because they exploit existing trust relationships between banks and their customers.”
Posted in Home | Comments Off
In case you’re behind the internet learning curve, this article is a good reminder that you should use unique passwords for different sites. Facebook is a large target, with a shocking number of compromised accounts each day. Don’t make yourself a target by lumping your Facebook authentication into the same basket as your important financial data. Always use strong passwords!
Still using Internet Explorer version 5 or 6? Not sure what version of Internet Explorer you’re using? You can find out by going to “About Internet Explorer” in the “Help” menu of your browser window.
The Internet is always changing and improving. New threats also surface regularly. It is important to keep your browser up to date to ensure a safe, straightforward, and hassle–free experience on the Internet.
We have provided links below to a few of the most popular current browsers.
Available for most platforms including Windows, Mac OS X, and Linux. Very customizable and extensible with Add-ons.
Internet Explorer 8 & 9
More secure and standards–compliant version of Internet Explorer.
An up and coming browser using the same standards compliant WebKit rendering engine as Apple’s Safari.
It renders web pages at lightning speed. It works on iPad, iPhone, iPod touch, Mac, and PC.
What if my computer won’t run these browsers?
Although it might be nice if that computer you bought years ago would keep working the same way forever, that’s just not the online world. The increasing need for better security and the constant improvements in features and capabilities require hardware and software that can keep up…and keep your important financial information safe and secure.
It’s easy to spot Nigerian scams, but an increasing number of credit union members are encountering more sophisticated frauds through email solicitations, phone calls and even text messages. In recent weeks, credit unions like SESLOC Credit Union ($526.7M, San Louis Abispo, CA) have reported that members are continuing to field these phishing scams, with an increasing number that are targeting the elderly. For example, one SESLOC member reported receiving a fake phone call about her grandchild being in police custody in Canada and needing money to be released. Another reported hearing that she’d won a prize by paying her utility bills on time, but she needed to give out her personal information to claim it.
It’s coming up on that time of the year when you start to see the “End of Year” lists. Mashable has the list of the 25 most common passwords based on SplashData’s records.
Check out the list. If you use any of these passwords you should change it. Also scroll to the bottom of the article for 3 easy tips on picking a better password.
“Identity theft is a growing a concern, though the roots of ID theft have been strangling us for years.
Now, however, fraudsters have perfected ID theft by connecting dots of consumer information from numerous sources, such as Facebook profiles, cell phone records, snail-mail addresses and e-mail accounts.”
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.