Skip to main content

The Latest

  • What is Pharming?
    What is Pharming?
    I was surfing on YouTube the other day and found this hilariousvideo mash-upof Taylor Swift’s song “Shake It Off” and an 80s aerobics video. For a lot of kids today, mash-ups are all the rage—whether it’s combining...
  • How to win the War on Phishing
    How to win the War on Phishing
    A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick.The trick is that the e...
  • Home Depot breach worse than first thought
    Home Depot breach worse than first thought
    After a two month long investigation Home Depot released a final report on the security breach that happened earlier this year. The findings of the report show that the breach was worse than first thought. Along with the 56 million credit &...
  • Online Scam
    Online scams continue to thrive
    If it appears to you that there are more online scams than ever before, you’re right. A hundred years ago, people with these criminal tendencies would have been snake- oil salesmen, rainmakers or members of a traveling band of gypsies. Today...
  • Phishing - social engineering fraud at its worst
    Social engineering exploits vulnerabilities of human hardware
    The present-day con artists are very well aware of the weakest link in an arbitrary organization that they intend to hack into. It’s not really the firewalls, military-grade encryption or cutting-edge intrusion detection systems. It’s...
  • Phishing Scam Targets Amazon Customers
    Phishing Scam Targets Amazon Customers
    Beware of a new phishing scam with e-mails that appear to be from Amazon.com. They look like this:Dear Customer,Some information on your account appears to be missing or incorrect.Please update your information promptly so that you can continue to...
  • For your safety: Understanding computer terms for illegal activity, phishing
    For your safety: Understanding computer terms for illegal activity, phishing
    Scam artists and identity thieves are continuously, ruthlessly, and successfully stealing your money. They use an array of illegal practices. Combating these means knowing and understanding their most commonly used terms of the trade. One of them...
  • 7 Ways to Tell If It’s a Fake
    7 Ways to Tell If It’s a Fake
    Unfortunately in today’s world, scammers are coming at us from all angles to try and trick us to get us to part with our hard earned money. We all need to be vigilant in protecting ourselves online. If you aren’t paying attention&mdash...
  • Tax Scams
    Tax scams and how to avoid them
    Tax time, like any special time of the year, always sees an increase in phishing scams in email and online. So it is a good idea to be on your guard so you don’t become a victim.Scams at tax time often use the IRS name/logo looking for your...
  • Warning: 'Netflix' phishing scam steals your data
    Warning: 'Netflix' phishing scam steals your data
    “Netflix” subscribers beware. A new phishing scam directed at “Netflix” subscribers steals your data and your identity by tricking you into calling phony “Netflix” tech support, according to a March 5 article in...
  • Netflix phishing scam
    Netflix phishing scam: 40 million Netflix subscribers at risk for phishing scam
    A Netflix phishing scam is targeting millions of customers of the on-demand Internet streaming media company with a bogus site alert which states the user's Netflix account has been suspended. The warning says that “unusual activity...
  • Cyber Monday Awareness
    Cyber Monday Awareness
    With the upcoming online shopping event Cyber Monday approaching in a few days, the potential for Distributed Denial of Service attacks (DDoS) and other issues of hacktivism and cyber-crime are likely to emerge and become more prominent. Although...
  • How's your phishing fitness?
    How's your phishing fitness?
    Most readers know what “phishing” is – when someone tries to acquire your username, password, credit card or bank account number, or even send computer viruses - by pretending to be a legitimate source of inquiry via e-mail...
  • Royal baby
    Royal baby scams and malware
    With each real world event—good or bad—there seems to be a wave of malware that accompanies it. Whether it’s a hurricane or a new royal baby, you can always expect spam laced malware to follow. With the birth of Prince George it...
  • Twitter two-step verification
    Twitter launches two-step verification, but who does it benefit?
    After the recent Twitter attacks against members of the media, Twitter has decided to bump up their security. According to the LA Times on May 23, there is now a two-step verification option that should keep hackers on the outside. And this...