- What is Phishing?
- Protecting Yourself
- Educating Yourself
- If You Fall Victim
- Fast Facts
- About This Site
- Advanced Malware
- anomaly detection
- application telemetry
- big data
- Black Hole
- Blackhole exploit kit
- Collective Threat Intelligence
- crash reports
- CUNA News
- Data loss
- data theft prevention
- Deputy Dog
- dr. watson
- Ephemeral Hydra
- exploit kit
- exploit kits
- Google News
- Malicious emails
- malicious iframes
- Mass Injection
- MSIE 0-day
- National Credit Union Administration
- Neutrino exploit kit
- Phishing Alerts
- Rogue AV
- Social Engineering
- Social Networks
- Spear Phishing
- Targeted Attack
- Targeted attacks
- US-CERT Security Tips
- US-CERT Security Tips
- Vulnerability Analysis
- Web 2.0
- Websense Security Labs
- windows error reporting
- Keep Your Browser Updated to Reduce Threats!
- Police warn of fake eBay Motors scam – WBXH
- Cloud-based Password Services – Secure?
- Low-income CU financially empowers NY neighborhood
- Mercer: Ohio CUs need to be tougher to sell a powerful idea
- Ky latest state to enact data breach protection
- Technical difficulty disrupts News Now distribution
- New video provides NCUA answers to CUs’ RBC questions
- Carolina CUs, armed with membership numbers, call on lawmakers
- NCUA a-Twitter with fin lit chat
- Stress testing for large CUs, common bond proposal on next NCUA agenda
- CUNA, NAFCU jointly repeat urging for RBC comment extension
- CUs, league win reg relief as Wis gov signs CU bill
- Small Ark CU offers loan growth advice
- Rewards accounts attractive to Gen Y, says Kasasa
- NCUA: CUs can help consumers avoid predatory payday loans
- Function should be focus of any CUSO regs, says NASCUS chair
- World Council suggests revisions to international RBA guidance
- Nearly all 12 districts saw improvements in economy: Beige Book
- When it comes to spring scams, delete, avoid, and hang up – Noise
- Fraudulent calls, texts for bank account appear valid – New Baltimore Voice Newspapers
The United States Computer Emergency Readiness Team (US-CERT) has some good tips on reducing spam. With the steady increase in the amount of email spam the average internet user receives, it may become harder to discern which messages are spam and which are legitimate. Reducing the amount of spam you must receive may help protect you from phishing attempts, as well as make your email inbox easier to keep tidy. Read the linked article for the tips.
If you’ve used the Internet for banking or shopping in the last fifteen years, you’ve probably received numerous notifications, warnings, and bits of advice regarding ways to keep your information safe online.Security is fundamental to us at BankSimple, and below we’ve compiled six important tips that can help you independently safeguard your personal and financial data.
Your smartphone is a computer. And it has access to various pieces of data that should be considered private or protected. So what kind of password are you using to protect access to your smartphone? Are you even using a password?
Daniel Amitay, an iPhone developer, did some casual research on what the common iPhone passcodes likely are. Similar to the most common password lists, the results show that most people choose insecure, or easily guessable passcodes.
Out of 204,508 recorded passcodes, the top ten most common were:
The answer, according to top security experts, is a qualified “yes.” Using the Internet to bank, buy music, or shop is still as safe or safer than visiting brick-and-mortar locations, as long as consumers take precautions and know what to do if they notice any suspicious activity.
Over 80% of credit reports have errors on them, errors which could be lowering your credit score and keeping you from getting credit or paying more for it than you should.
Posted in Home | Comments Off
Lifehacker provides a little insight into the thought processes a professional password guesser uses to guess your password. Security expert Roger Grimes writes at InfoWorld how easily passwords can be guessed and says that these days passwords need to be longer than the mere six-to-eight characters typically used.
Consider lengthening your password and including special characters in it. The longer and more random your password is, the harder it is to guess. Lifehacker also provides a list of the most commonly used passwords. Make sure your passwords are not on this list. Also check out the password tips at the bottom this article.
It’s no secret that criminals try to use huge disasters to their benefit to make some cash, this time is no exception! We have been able to track several black hat methods to convince people to "help” Japan’s disaster-affected population. The set of techniques are not new and usually involve:
If you use Facebook, MySpace, LinkedIn, or any Social Networking Community website, you may want to take a closer look at your privacy settings. The US-CERT, (United States Computer Readiness Team), offers some good tips on Staying Safe on Social Network Sites. One important tip is simply recognizing that infomation you post on the web for your friends to read may be open for the world to see.
Posted in Home | Comments Off
The Federal Trade Commission has launched the website and blog for National Consumer Protection Week (NCPW) 2011, to be held March 6-12. The annual event, now in its 13th year, is hosted by the FTC and nearly 30 other government agencies, consumer groups, and national organizations. The website, www.ncpw.gov, provides information about consumer rights, and promotes free resources to help consumers protect their privacy, manage credit and debt, avoid identity theft, understand mortgages, and recognize frauds and scams.
Many of us have that special someone in our lives who needs a little extra training on common computer tasks. A new site has been “built by a few folks at Google to help keep tech support a family business.” There are some helpful videos on a number of topics, including the following security related videos.
- create a strong password
- upgrade your browser