Trending Security Topics

Cybersecurity Awareness Basics

How to avoid identity theft, frauds, scams and more. Click below for more information.

Cybersecurity Basics

The Top 20 Security Predictions for 2020

Whether you call them cybersecurity forecasts, online risk trends or security predictions, here’s a roundup of what our top security companies, industry experts and tech magazines are saying about the year (and decade) ahead. How can you prepare for 2020? From “Government Technology” Dan Lohrmann (12/15/2019)


OUCH! Newsletter: Messaging / Smishing

One of the most common ways cyber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick you with phone calls. However, as technology continues to advance bad guys are always trying new methods, to include tricking you with messaging technologies such as text messaging, iMessage/Facetime, WhatsApp, Slack or Skype. Here are some simple steps to protect yourself and spot / stop these common attacks. From “SANS OUCH Newsletter” Jen Fox (12/04/2019)


Scammers Pretend To Be The FTC

We know about this scam because a gentleman in Pennsylvania was smart enough to take it to his bank, and together, they reported it to the FTC. The letter said his online and financial activities put him under suspicion of money laundering and terrorism. And now, all his “activities will be under review.” Our best guess is that this letter is just the first part of a scam. The second part will probably involve “urgent” phone calls telling people to send money right away. From “Federal Trade Commission” (12/03/2019)


Caller Poses As CISA Rep In Extortion Scam

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of a phone scam where a caller pretends to be a CISA representative. The scammer claims to have knowledge of the potential victim’s questionable behavior and attempts to extort money. From “CISA” (11/29/2019)


FTC Provides Tips On Safeguarding Data Before Upgrading Mobile Phones

The Federal Trade Commission (FTC) has released an article with tips on how to protect personal information before trading in a mobile phone for a newer model. From “CISA” (11/19/2019)


Hidden Cam Above Bluetooth Pump Skimmer

Whoever hacked this fuel pump was able to get inside the machine and install a Bluetooth-based circuit board that connects to the power and can transmit stolen card data wirelessly. This allows the thieves to drive by at any time and download the card data remotely from a mobile device or laptop. From “Krebs on Security” Brian Krebs (11/25/2019)


The 10 Most Important Cyberattacks Of The Decade

"All of a sudden, we're in the age of career-ending or career-altering hack. Honestly in 2011, if you had a hack with over a million credentials, everyone would lose their mind," Maor said. "Today, you probably won't even read about hacks that happen with a couple million credentials stolen." From “Tech Republic” Jonathan Greig (12/04/2019)


Microsoft Reveals Smart Phishing Techniques of 2019

In its recently released 2019 Cybersecurity Trends report, Microsoft highlighted that phishing was one of the attack vectors that was rising over the past two years. “In 2019, we saw phishing attacks reach new levels of creativity and sophistication,” Microsoft said. From “CISO Mag” (12/13/2019)


Getting Bombarded By Scam Calls? You’re Not Alone.

As soon as a caller threatens you, or demands you pay them with a gift card or by wiring money. It’s a scam. Even if the caller ID tells you otherwise. From ““Federal Trade Commission” (12/16/2019)


FDIC Consumer News: What You Should Know About Gift Cards

Under the law, a gift card cannot expire until at least five years from the date it was activated. The law also places general limitations on fees. For instance, the card issuer cannot charge a dormancy or inactivity fee on a gift card unless there has been no activity for one year and the card clearly states its policy toward that fee. In addition, some states have separate laws that provide added protection in certain circumstances. From “FDIC” (12/17/2019)


2019 Witnessed 5 Of The Biggest Cybersecurity Trends. Do You Know What They Are? (Click link to see full article.)

Even when different organizations and businesses have varying needs that depend on cybersecurity solutions, IT security remains to be a consistent problem among organizations. This article covers the 4 most prominent cybersecurity trends of this year, including frequently emerging types of attacks, a new kind of attack vector, the sectors that are being cyber-targeted more than often, and more. From “EC-Council” (11/19/2019)