- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- control panel
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- malicious iframes
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Nuclear exploit kit
- Phishing Alerts
- Point Of Sale Malware
- POS malware
- RIG Exploit Kit
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- windows error reporting
- Zeus PIF
- Keep Your Browser Updated to Reduce Threats!
- Scam Phishing Phone call – Albany Times Union (blog)
- Weekly analysis – 13th September 2014 to 20th September 2014
- Look here: Last day to submit News Now survey
- Smacked by 100K compromised records, Maine CUs help members
- Waiting game for CU after Weed, Calif, wildfire
- TCCUSF update, tech amendments approved by NCUA
- NCUA’s McWatters says new RBC comment period is needed
- Fed plans no debit fee cap change
- Herring legacy carried forward with merger
- CFPB has mortgage scammers, nonbank auto lenders on radar
- Your opinion wanted: News Now survey
- Today’s NCUA meeting is 1st for new board member McWatters
- EMV rollout gains steam at CUs
- Senate Banking leaders request FHLB membership comment extension
- Fall sweep: CU message hits Hill hard before session ends
- Congress should listen, act on reg relief concerns, lawmakers say at forum
- Fed rate changes hinge on economic expansion, Hampel says
- Comments on CFPB’s consumer complaint data narrative due Sept 22
- Take this survey, please
- Rep Holding says 2nd RBC comment period needed
Still using Internet Explorer version 5 or 6? Not sure what version of Internet Explorer you’re using? You can find out by going to “About Internet Explorer” in the “Help” menu of your browser window.
The Internet is always changing and improving. New threats also surface regularly. It is important to keep your browser up to date to ensure a safe, straightforward, and hassle–free experience on the Internet.
We have provided links below to a few of the most popular current browsers.
Available for most platforms including Windows, Mac OS X, and Linux. Very customizable and extensible with Add-ons.
Internet Explorer 8 & 9
More secure and standards–compliant version of Internet Explorer.
An up and coming browser using the same standards compliant WebKit rendering engine as Apple’s Safari.
It renders web pages at lightning speed. It works on iPad, iPhone, iPod touch, Mac, and PC.
What if my computer won’t run these browsers?
Although it might be nice if that computer you bought years ago would keep working the same way forever, that’s just not the online world. The increasing need for better security and the constant improvements in features and capabilities require hardware and software that can keep up…and keep your important financial information safe and secure.
It’s easy to spot Nigerian scams, but an increasing number of credit union members are encountering more sophisticated frauds through email solicitations, phone calls and even text messages. In recent weeks, credit unions like SESLOC Credit Union ($526.7M, San Louis Abispo, CA) have reported that members are continuing to field these phishing scams, with an increasing number that are targeting the elderly. For example, one SESLOC member reported receiving a fake phone call about her grandchild being in police custody in Canada and needing money to be released. Another reported hearing that she’d won a prize by paying her utility bills on time, but she needed to give out her personal information to claim it.
It’s coming up on that time of the year when you start to see the “End of Year” lists. Mashable has the list of the 25 most common passwords based on SplashData’s records.
Check out the list. If you use any of these passwords you should change it. Also scroll to the bottom of the article for 3 easy tips on picking a better password.
“Identity theft is a growing a concern, though the roots of ID theft have been strangling us for years.
Now, however, fraudsters have perfected ID theft by connecting dots of consumer information from numerous sources, such as Facebook profiles, cell phone records, snail-mail addresses and e-mail accounts.”
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.
If you’ve used the Internet for banking or shopping in the last fifteen years, you’ve probably received numerous notifications, warnings, and bits of advice regarding ways to keep your information safe online.Security is fundamental to us at BankSimple, and below we’ve compiled six important tips that can help you independently safeguard your personal and financial data.
Your smartphone is a computer. And it has access to various pieces of data that should be considered private or protected. So what kind of password are you using to protect access to your smartphone? Are you even using a password?
Daniel Amitay, an iPhone developer, did some casual research on what the common iPhone passcodes likely are. Similar to the most common password lists, the results show that most people choose insecure, or easily guessable passcodes.
Out of 204,508 recorded passcodes, the top ten most common were:
The answer, according to top security experts, is a qualified “yes.” Using the Internet to bank, buy music, or shop is still as safe or safer than visiting brick-and-mortar locations, as long as consumers take precautions and know what to do if they notice any suspicious activity.