Maybe the thought actually occurred to you that something was “phishy” about that link, but that’s so 30 seconds ago. You clicked and now your computer screen is locked. Behind that frozen screen lie your personal files — everything from photos to tax documents — all of it encrypted by a third party that promises to return access for a ransom, which is usually between $200...Read More
Facebook, Twitter, Snapchat, Pinterest—Social media is a great way to stay connected while sharing news and ideas. But if you’re not careful, you can end up doing serious harm to your good name.
Most users know that there are just certain things to avoid posting on social media, such as compromising photos, your Social Security number, and your bank account number. But there are a lot of other things that can come back to haunt...Read More
By James LaDue
The internet is a strange and dangerous place, especially when it comes to your personal information. With all the hackers and scammers out there, protecting your information in cyberspace is much more of a challenge these days than simply demonstrating common sense. And you can’t just rely on your bank’s internet security measures anymore.
Cyber-thieves have now found...Read More
The only sure thing in the world of information security is that there is no such thing as a failsafe solution. It’s crucial not only to keep abreast of the latest threats out there, but to also act as though the mission is to find your way to safety from the middle of a lawless demilitarized zone that’s lousy with enemy snipers.
Sound extreme? Remember that Cold War classic “A Few Good Men” when Colonel Jessup (played by Jack...Read More
If you still have the “it’ll never happen to me” perspective on fraud, here’s a stat that might persuade you to change your view: ATM card skimming incidents increased 546% from 2014 to 2015.
That figure comes from financial analytics company FICO and its FICO Card Alert Service software, which is designed to detect fraud resulting from things like debit and credit card skimming.
Unless you want to go to a physical bank branch, wait in line and work with a teller to make a...Read More
Financial institutions (FIs) are prime targets for attacks – they hold an enormous amount of business information, customer financial data, and other forms of PII. FIs should consider working with a consultant to perform a vulnerability assessment to find potential exposure points in systems, software, and procedures.
The purpose of Vulnerability Assessment (VA) is to enable the enterprise to be aware of gaps in its IT security that an attacker could exploit in order to:Steal or... Read More
The Identity Theft Resource Center has noticed some new scams in recent weeks, but you may find that some of them are old scams wearing a 2016 face-lift.
1. Boss Phishing
This scam already has taken a number of companies to the cleaners, mostly because it works really well. One recent high-profile victim of boss phishing includes the...Read More
Adam Levin’s new book, Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves, derives from a long-standing passion to educate individuals and companies on personal finance, identity management and privacy issues.
ThirdCertainty recently asked the former director of the New Jersey Division of Consumer Affairs and chairman and...Read More