Sunday Funnies – Funny SSID Names

Here are some clever ideas for funny wireless network names.  Also called a Service Set Identifier or (SSID).  Plus a funny story about one of those names.

From Naked Security:  Why ‘remote detonator’ is a bad name for your Wi-Fi network.  Police and a bomb sniffing dog were called.

Top fifty funniest SSID names: (from buyvia.com)

Here are the top ten:

  1. It Burns When IP
  2. I’m Under Your Bed
  3. Pretty Fly ...
Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FBI Releases IC3 2017 Internet Crime Report

05/07/2018 08:30 PM EDT  Original release date: May 07, 2018

FBI has released the Internet Crime Complaint Center (IC3) 2017 Internet Crime Report, which highlights scams trending online. The top three crime types reported by victims in 2017 were non-payment/non-delivery, personal data breach, ...

Continue Reading →
0

How Secure Are Mobile Payment Apps Anyway?

The latest trend in the card payment universe are the mobile payment apps that let you use a smart watch or smartphone in place of a credit card.  Just how secure are these payment systems?  One of my regular readers, Eric Morley, owner of Big Frog Custom T-Shirts in Woodbury, MN, asked me that question via LinkedIn, and I thought it was a great idea for an ...

Continue Reading →
0

Credit Card Fraud Hit 33 Million Americans in 2017

If you were hit with credit card fraud this year, you are not alone.  15% of Americans surveyed by CompareCards, a LendingTree subsidiary, reported they had been victimized in 2017.  Fraud can happen without losing your card.  While card companies and banks are more alert to fraud than ever, cardholders are often the first to discover the fraudulent use of their card.

The two main types of card ...

Continue Reading →
0

Secret Service Warns About Chip Swapping Credit Card Scam

The EMV chip has make credit card fraud harder, but credit card fraudsters are taking an interesting new twist.  By intercepting new credit cards in the mail, they are stealing the new chip off the card and replacing it with an old, dead chip, before resealing the envelope and sending it on to the recipient.  The new chip is glued on to a fake card.  When the recipient activates the new card, the stolen chip is activated, and the theives ...

Continue Reading →
0
Page 150 of 278 «...120130140148149150151152...»