Trending Security Topics
Cybersecurity Awareness Basics
How to avoid identity theft, frauds, scams and more. Click below for more information.
You probably have heard of terms such as virus, Trojan, ransomware, or rootkit when people talk about cyber security. These are different types of malicious programs, called malware, that cyber criminals use to infect computers and devices. Once installed, they can do whatever they want. Learn what malware is, what danger it poses, and most importantly, what you can do to protect yourself from it.
From “SANS OUCH! Newsletter” Lenny Zeltser (6/06/2018)
Web site names ending in new top-level domains (TLDs) like .men, .work and .click are some of the riskiest and spammy-est on the Internet, according to experts who track such concentrations of badness online. Not that there still aren’t a whole mess of nasty .com, .net and .biz domains out there, but relative to their size (i.e. overall number of domains) these newer TLDs are far dicier to visit than most online destinations.
From “Krebs on Security” Brian Krebs (6/18/2018)
As summer begins, many people will travel with their mobile devices. Although these devices— such as smart phones, tablets, and laptops—offer a range of conveniences, users should be mindful of potential threats and vulnerabilities while traveling with them.
From “US-CERT” (5/25/2018)
Alarming data from ACI Worldwide shows that in 2017, fraud rates spiked 30 percent from 2016, with identity theft (via data breaches), account takeover (including phishing attacks) and friendly fraud (chargebacks) the most prevalent threats. Aite Group’s findings that 61 percent of fraud can be traced back to the contact center are equally concerning, as is its prediction that contact center fraud loss will double by 2020.
From “BAI Banking Strategies” John Cray (5/22/2018)
Hoping to thwart a sophisticated malware system linked to Russia that has infected hundreds of thousands of internet routers, the F.B.I. has made an urgent request to anybody with one of the devices: Turn it off, and then turn it back on.
From “The New York Times” Louis Lucero II (5/27/2018)
Anyone who registered an account with the company through Oct. 26, 2017, when the breach occurred, is affected. MyHeritage has not detected abnormal activity associated with leaked accounts since that day.
From “Bank Info Security” Jeremy Kirk (6/06/2018)
The Internal Revenue Service (IRS) has issued a news release warning tax professionals to beware of a new phishing email scam. Cyber criminals posing as state accounting and professional associations have been sending emails to entice their targets to reveal login credentials.
From “US-CERT” (5/24/2018)
Any data stored on a computer or server infected with ransomware is vulnerable, and that includes video, images, audio, and other types of media. It's easy to overlook these kinds of files, but their loss could have serious impacts on an organization in ways it's hard to immediately consider.
From “Tech Republic” Brandon Vigliarolo (6/06/2018)
Why is it important to make sure each of these reports is accurate? This may be your first indicator that someone is committing fraud in your name. In addition, these credit agencies sell this information to creditors, employers, insurance companies, and other businesses. The information in this record may make a difference in whether you get a mortgage, new car loan, new credit card, get a job or pass a rental screening.
From “FBI Portland” (5/22/2018)
Home network security refers to the protection of a network that connects devices to each other and to the internet within a home. Whether it’s staying in touch with friends and family, paying your bills electronically, or teleworking, the internet enables us to accomplish tasks more efficiently and conveniently from the comfort of our own homes. However, as we increasingly embed technology into our daily lives, the risk of security issues also increases. As a result, it’s imperative that home users understand and remain vigilant about the risks of being connected to the internet and the importance of properly securing home networks and systems.
From “US-CERT” (5/23/2018)
It’s vital for parents to stay involved in their kids’ online lives. Sharing on social and playing games are two popular mobile device pastimes. Keep in mind that both activities could likely include the potential sharing of names, birthdays, age, geographic location, contact information and photos with identifiable information. Children of all ages must be taught that a level of anonymity will help to protect them from those who might not have the best intentions.
From “National Cybersecurity Alliance” (5/31/2018)