From PinterestContinue Reading →
We generally delve pretty exclusively in cybersecurity issues here, but I received an email from Marie Villeza of Elder Impact and thought the information was worth posting. Members of my own family have fallen for some of these scams, one lost $16,000 to scammers claiming to be the police, who accepted this payment in lieu of charging a “grandchild” with a crime. Below is the body of Marie’s email.
Continue Reading →
From: Marie Villeza <email@example.com>
Subject: Resource Guides to Help Catch Scammers Before ...
Identity theft is becoming commonplace, and many people are still confused about what to do when it happens to them. Last year we had a couple of things happen that were concerning. The first instance was when we received a T-Mobile debit card that was ordered in a Safeway store in Silver Springs, Maryland, made out in my wife’s name, and mailed to our address in Bayport, MN. We cancelled the card with T-Mobile off course and checked the three credit bureaus. ...Continue Reading →
The Gameover Zeus and related Neverquest banking Trojan exploits are one of the most truly frightening security nightmares facing small businesses and individuals. These exploits allow a remote attacker to join you on an online banking session, and then transfer funds from your account after you thought the session was over.
The US State Department has place a $3 million bounty on the head of Evgeniy Mikhailovich Bogachev, The criminal mastermind behind the Gameover ...Continue Reading →
The Internet has a dark side, the online underground know as the Dark Web. Inhabited by cyber-criminals, hacktivists, jihadists, terrorists, gun runners, drug-dealers, whistleblowers and freedom fighters, the web sites of the Dark Web are not generally available to the curious without a bit of work and can usually be accessed only by using something like the TOR browser.Continue Reading →
AV-TEST, the German independent testing laboratory, has published its award for best security products of 2014. If you like to use best of breed products, this report is for you. If you would like to see how the security software you are using stacks up to the competition, this report will provide that insight as well.
The results, ...Continue Reading →
The easiest way for a cyber-attacker to get into your network is through your email. This can be accomplished a number of different ways, but a successful exploit may use several of these methods together to gain access to your network and control your computer systems. The great thing, from the attacker’s perspective, is that by using your email, they can get around whatever perimeter defenses you have, such as firewalls and intrusion detection systems, and can even beat the ...Continue Reading →
There is another article about the Lenovo/Superfish debacle on Silicon Beat that looks at what this application is supposed to do, and what it actual is doing, and a bit into what it could do if it so chooses. None of it sounds all that great and some of it is scary.
Superfish is supposed to allow users to take a picture, submit it to Superfish, and Superfish will search the web for a close match and return the results to ...Continue Reading →