Post-Snowden Paranoia Causes Changes in Communication

“Just because you’re paranoid, it doesn’t mean they are not out to get you.”

Since Edward Snowden’s revelations about the domestic surveillance activities of the NSA and other US and foreign government agencies, it turns out that many people have changed their online and telephone communication behavior.  accord to a recent post on Sophos:

“Out of those surveyed who are at least somewhat aware of the NSA’s surveillance programs (30% of adults), 34% have taken at least one step to ...

Continue Reading →
0

Protecting Yourself (And Elderly Family Members) From Fraud

We generally delve pretty exclusively in cybersecurity issues here, but I received an email from Marie Villeza of Elder Impact and thought the information was worth posting. Members of my own family have fallen for some of these scams, one lost $16,000 to scammers claiming to be the police, who accepted this payment in lieu of charging a “grandchild” with a crime.  Below is the body of Marie’s email.

From: Marie Villeza <information@elderimpact.org>

Subject: Resource Guides to Help Catch Scammers Before ...

Continue Reading →
0

What To Do If Your Identity Is Stolen

Identity theft is becoming commonplace, and many people are still confused about what to do when it happens to them.  Last year we had a couple of things happen that were concerning. The first instance was when we received a T-Mobile debit card that was ordered in a Safeway store in Silver Springs, Maryland, made out in my wife’s name, and mailed to our address in Bayport, MN.  We cancelled the card with T-Mobile off course and checked the three credit bureaus. ...

Continue Reading →
0

US Announces It’s Game Over For Zeus Kingpin

Bogachev Wanted posterThe Gameover Zeus and related Neverquest banking Trojan exploits are one of the most truly frightening security nightmares facing small businesses and individuals.  These exploits allow a remote attacker to join you on an online banking session, and then transfer funds from your account after you thought the session was over.

The US State Department has place a $3 million bounty on the head of Evgeniy Mikhailovich Bogachev, The criminal mastermind behind the Gameover ...

Continue Reading →
0

Browse the Dark Web with Onion.city

The Internet has a dark side, the online underground know as the Dark Web.  Inhabited by cyber-criminals, hacktivists, jihadists, terrorists, gun runners, drug-dealers, whistleblowers and freedom fighters, the web sites of the Dark Web are not generally available to the curious without a bit of work and can usually be accessed only by using something like the TOR browser.

Continue Reading →
0

Best of Breed Security Software

imageAV-TEST, the German independent testing laboratory, has published its award for best security products of 2014.  If you like to use best of breed products, this report is for you.  If you would like to see how the security software you are using stacks up to the competition, this report will provide that insight as well.

The ...

Continue Reading →
0

How Cyber-Attackers Use Your Email Against You

The easiest way for a cyber-attacker to get into your network is through your email.  This can be accomplished a number of different ways, but a successful exploit may use several of these methods together to gain access to your network and control your computer systems.  The great thing, from the attacker’s perspective, is that by using your email, they can get around whatever perimeter defenses you have, such as firewalls and intrusion detection systems, and can even beat the ...

Continue Reading →
0
Page 225 of 278 «...200210220223224225226227...»