How I Got Your Password – Part 2

Did you know that the easiest way for me to get your password is just to ask for it? This is one way that cyber-criminals can get one of your passwords. In  our last post we focused on password cracking.  Today we will look at all the other ways that an clever attacker can compromise your password.

  • Social Engineering – Sometimes the easiest way to get password information is just to ask for it.  Social engineering is a type of con ...
Continue Reading →
0

Where Does Cell Phone Location Data Go?

Have you ever wondered what happens to the location information your smartphone is collecting about you?  Who has access to that information, and for what purpose?  As it turns out, as told in a recent report by Brian Krebs, this information is available to pretty much anybody.

A related article in Sophos’ Naked Security blog pointed to a Continue Reading →

0

The Role of the IC3 in Cybercrime Prosecution

If your business has been the victim of a cybersecurity incident, data breach, or other cybercrime, you may have had to decide whether to keep the incident to yourself, or report the crime to the police.  If you carry cyber insurance, reporting the crime is a requirement to file an insurance claim.  So you called the police and filed a report,  You may have been discouraged by the lack of enthusiasm ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


WordPress turns 15 on Sunday May 27

WordPress will be 15 years old this May 27th, 2018!  On Sunday, May 27th, we’re planning a global event celebrating the WordPress 15th Anniversary with WordPress community groups around the world.


Alexa, Siri and Google can be tricked by commands you can’t hear

Researchers have shown how attackers could trick ...

Continue Reading →
0

Protecting Yourself from Browser Hacking

This week we have been investigating browser hacking, or the inadvertent disclosure of personal information that is saved and stored by your browser.  Today we will be showing several actions you can take to keep your information private.

The best way to protect yourself from a remote attacker is to prevent the remote access malware needed to access your computer from installing ...

Continue Reading →
0

How Secure Are Mobile Payment Apps Anyway?

The latest trend in the card payment universe are the mobile payment apps that let you use a smart watch or smartphone in place of a credit card.  Just how secure are these payment systems?  One of my regular readers, Eric Morley, owner of Big Frog Custom T-Shirts in Woodbury, MN, asked me that question via LinkedIn, and I thought it was a great idea for an article.  ...

Continue Reading →
0

Credit Card Fraud Hit 33 Million Americans in 2017

If you were hit with credit card fraud this year, you are not alone.  15% of Americans surveyed by CompareCards, a LendingTree subsidiary, reported they had been victimized in 2017.  Fraud can happen without losing your card.  While card companies and banks are more alert to fraud than ever, cardholders are often the first to discover the fraudulent use of their card.

The two main types of card fraud ...

Continue Reading →
0

Secret Service Warns About Chip Swapping Credit Card Scam

The EMV chip has make credit card fraud harder, but credit card fraudsters are taking an interesting new twist.  By intercepting new credit cards in the mail, they are stealing the new chip off the card and replacing it with an old, dead chip, before resealing the envelope and sending it on to the recipient.  The new chip is glued on to a fake card.  When the recipient activates the new card, the stolen chip is activated, and the theives ...

Continue Reading →
0
Page 1 of 10 12345...»