Protecting Your Financial Assets

Almost all cyber-crime is about making money for the crooks.  Often this involves stealing valuable information that can be sold.  But many criminal gangs are going straight for the cash, and often this involves bank and financial account fraud or financial account access.

Below we have a list of strategies you can use to protect your financial resources.

  • Use a credit card ...
Continue Reading →
0

Sunday Funnies: Cursing Explained

Some people curse for emphasis, and I am one of those people.  As an old English major, i hold to the belief that words are just words, and only have the power we give them.  I always have to be super diligent when I am presenting in public, because the odd swear word occasionally appears, and I have heard from the people who were offended by that.

It turns out, according to the BBC, that swearing has a pain-relieving ...

Continue Reading →
0

Don’t Make Yourself A Target

Many social network sites make it too easy to overshare personal information.  An innocent post to Twitter or Facebook, or pictures uploaded to SnapChat or Instagram can help a criminal target you.  Online posts that identify your location, your travel and vacation plans, your employer, your home, and your personal possessions can be used by criminals to plan an crime.  Kidnapping ...

Continue Reading →
0

Keeping Your Personal Data Safe – Is It Impossible?

Believe it or not, two out of three people in the United States have had their personal information stolen by cyber-criminals.  The likelihood is that this has already happened to you, and if not, it will happen eventually.  And if it has happened, it will probably happen again.  Why is this?

Even if you never click on a phishing email, and ...

Continue Reading →
0

Web Tracking Via Browser and Device Profiling – No Cookies Needed!

I know many people who are religious about deleting their cookies and browser history in an effort to improve their online privacy.  I know others who have carefully gone through all the security settings on their browsers, and social networking sites for the same reason.  If this sounds like you, I have bad news.

I’ve been using Opera to browse the web, and trying out the ad-blocking feature and the location cloaking “VPN” ...

Continue Reading →
0

Top Cyber Threats for 2017

2017 is promising to be another difficult year for cyber-defenders who are protecting company and government networks from attack.  Here are what I think will be the top attack vectors this year.

Business Email Compromise

CEOs and other C suite officers will increasingly be targeted for email account hijacking.  This is an easy exploit to run because high ranking employees and officers often are ...

Continue Reading →
0

US-CERT Releases More About Grizzly Steppe

US-CERT just released more information about the Grizzly Steppe cybercrime group who has been fingered for hacking the DNC and US voter registration databases.  The short  report, titled Enhanced Analysis of GRIZZLY STEPPE Activity, makes interesting reading, especially if you are interested in finding out more about state-sponsored political espionage.  See pages 4-7 for the main story.

The Grizzly Steppe group is certainly ...

Continue Reading →
0

Should You Use Domain Privacy?

I will start out by admitting that I hate Domain Privacy.  But I just read a story in Naked Security on February 9th that is causing me to reevaluate my opinion.  It turns out that the new White House press secretary, Sean Spicer, has a personal website at www.seanspicer.com.   The website has been turned into a private site, but the WHOIS record ...

Continue Reading →
0
Page 7 of 105 «...56789...»