Most Americans Unaware of Personal Data Loss

Data breaches.  It seems that every week some other company is featured in the news as the latest victim.  But who really is the victim?  The company that was breached, or the people whose personal information was stolen?  Have you been affected by a data breach?  How would you know?

A recent survey published on Lexington Law ask over a thousand people whether they knew if their data ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tax Identity Theft: Protecting Your Credit and Finances

Check this out from the Simple Dollar.  Tax-related identity theft is a growing problem in America, and the more security breaches, information hacks and digital business we do as a society, the more consumers who fall victim to it. In fact, in 2016 alone, thieves stole more than $21 ...

Continue Reading →
0

It’s Not Just Phishing – Other Ways Email Is Exploited – Part 2

On Monday we investigated five ways that your email account can be used to initiate an cyber-attack against you.  Today we finish up this article with another five email attack vectors.

  • Clickjacking – In traditional click-jacking, a malicious email link actually direct you to a malicious or impostor site.  A new version places something that looks like a dirt spot or hair on the web page and when the user tries to ...
Continue Reading →
0

Collections 1-5 – Is This The Biggest Data Breach Ever?

Troy Hunt, of HaveIBeenPwned fame, on January 17 reported what may be the biggest data breach ever.  Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows.  That’s right, 2.6 billion rows.   773 million records, from over 12,000 files, with a total size surpassing 87 gigabytes.  That’s a lot of personally identifiable information ...

Continue Reading →
0

Watch Out For Social Security Scammers

Your phone may be ringing soon with a fraudulent call from the “Social Security Administration” about problems with your social security number.  The Federal Trade Commission is warning consumers about this fraud.  A transcript of a typical call is below.

“…law enforcement agencies to suspend your Social Security number on an immediate basis, as we have received suspicious trails of information in your name. ...

Continue Reading →
1

Phishing – Not Just For Email Anymore

You know those surveys, games, and “like and copy” messages that your Facebook “friends” share with you?  Would you be surprised to learn that many of these “fun with friends”  activities are just cover for a new form of phishing exploit?  In the last few years phishing attacks have evolved from a primarily email-based attack into attacks using other vectors including surveys, games, gifts and prizes, and social networks.

Continue Reading →

0

It’s Income Tax Fraud Season Again

Every year about this time, cyber-criminal groups start to ramp up for the annual income tax fraud season.  If you would prefer to receive your own tax refund, as opposed to letting some scam artist get it instead, the basic solution is to file your returns as early as possible.  Here are some things to be watching for.

  • W-2 reports phishing scam – This phishing scan usually targets company HR department personnel, ...
Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Steps To Take If You Are the Victim of Identity Theft.

It can be overwhelming to learn you’ve been a victim of identity theft. As in your case, crimes involving identity theft and credit fraud are often committed online.


How to share photos without using Facebook

There are other options for photo sharing ...

Continue Reading →
0

Top Cyber-Attack Vectors – Past, Present, and Future

Are you wondering what exploits represent the biggest threats in 2019?  It can be difficult and expensive to defend against everything.  If your company is budget-constrained, it may make more sense to defend against what is “likely” instead of everything that is “possible.”  Today we look at some of the biggest cyber-attack methods from the past, the present and the future.

Past

While these threats ...

Continue Reading →
0
Page 1 of 12 12345...»