Jun

16

Fake Virus Scanning Apps

With all the recent malware and ransomware attacks compromising hundreds of thousands of systems, the fear mongering of cyber news allowed another form of virus injection to expand. Trying to defend themselves from being attacked, people scramble to download antivirus apps to their phone. Interestingly enough, this spike in downloads is due to the WannaCry attacks, which doesn’t target mobile devices.  Read more

May

16

The WannaCry Ransomware Cyberattack

As mentioned in a recent CU*Secure article, ransomware attacks have been on the rise over the last few years. Just recently, The National Security Agency (NSA) uncovered WannaCrypt, better coined as WannaCry – ransomware that locked down hundreds of thousands of computers across the globe.
Read more

May

4

Beware unexpected Google Docs, the latest phishing scam

“Be careful when opening emails claiming to include links to a Google Document shared by people you know —they might be part of a phishing scam that spread quickly across the internet Wednesday.

If users click on the fraudulent link, they are brought to a Google page where they are asked to grant “Google Docs” access to all of their Google accounts — giving hackers an open door to their email and private documents.

It is not clear who is behind the phishing effort.

The phishing attempt spread across the internet for several hours before Google appeared to at least block the page allowing users to give data permissions. “

Read More »

Apr

17

Macro Malware: Here’s What You Need to Know

Macro Malware is not new. In fact, the threat has been around since the 90s and typically delivered in an email attachment in the form of a Microsoft Word or Excel file.

Read more

Mar

16

Ransomware on the Rise

Although not a new form of malicious internet spam, ransomware has increased dramatically throughout 2016 and into 2017- with spam emails up 6,000% since 2015, according to IBM. It’s only getting worse.
Read more

Mar

7

How Using Social Media can Set You Up for Scams

Social media can be described as one of the most renowned and used bits of technology established in the 21st century. It’s everywhere- Facebook, Twitter, YouTube, Instagram, LinkedIn, Pintrest,  Tumblr, Snapchat, Myspace, and a few hundred various dating sites. Not only is it everywhere, but it’s still expanding as more people each year join at least one form of social media.  According to the Pew Research Center,  nearly 70% of all Americans use social media today, a big jump up from 5% in 2005, and 50% in 2011.
Read more

Feb

27

Using a Password Manager

Do you find yourself forgetting your various passwords, and compensate by reusing the same one across multiple logins, or just using simple passwords that are easy to remember? With a password manager, you won’t have to worry about sacrificing security when utilizing multiple accounts.
Read more

Feb

24

Serious Cloudflare bug exposed a potpourri of secret customer data

“Cloudflare, a service that helps optimize the security and performance of more than 5.5 million websites, warned customers today that a recently fixed software bug exposed a range of sensitive information that could have included passwords and cookies and tokens used to authenticate users.”

Read More »

Feb

15

5 Ways To Protect Your Privacy Online

Big data is here to stay. Which means companies everywhere, including Facebook and Google, are tracking and mining user data in every way that they can. This also means that hackers will try to collect that data and use it for their own malicious purposes.

In today’s world, while security and privacy still go hand-in-hand, it’s not possible to retain total anonymity unless you are off the grid to the Internet of Things. So, for this moment in time when privacy is most critical, you need to find ways to protect yourself.

Listed below are the top 5 ways you can protect your privacy online:

Read more

Dec

15

How to Avoid Credit Card and Debit Card Skimmers at the ATM

Skimmers are legitimate looking card readers that grab the information from your card, once inserted. Typically, skimmers are attached to ATM terminals so that they can grab information from everyone and anyone who swipes their card. Some skimmers even allow for the ATM user to complete their intended transaction (retrieve money from the account, check account balance, deposit funds, etc.) while stealing the information.

The skimmer is designed to look exactly like the slot you put your Debit/Credit card in. It is designed to fit over top of the existing card reader.

Read more

Nov

30

Choosing a PIN Without Getting Hacked

PIN numbers are used everywhere. From unlocking your phone to accessing your bank account, Personal Identification Numbers are universally used as a security measure. The unfortunate part is that these are generally only four digits long- giving a potential hacker a 1 in 10,000 chance of breaking in on the first attempt, unless one uses a predictable sequence.

Read more