43 Results from 2012
Robert Siciliano Security Analyst at Safr.me
Natural disaster scam: Sadly, scammers seem to come out of the woodwork during a natural disaster such as Hurricane Sandy to catch consumers when they’re in a panic, looking for answers, and when they’re most vulnerable. People should not click on links or respond to phishing e-mails for relief donations that ask for credit card numbers or other pe...
19 December 2012 /security
There are two kinds of identity theft you must protect yourself from: New account fraud: Refers to financial identity theft in which the victim’s personal identifying information and good credit standing are used to create new accounts, which are then used to obtain products and services. Stolen Social Security numbers are often used to commit new...
14 December 2012 /security
Teens are spending more and more time online these days and while the Internet offers a variety of benefits it can also serve as a dangerous space –and not just in America. According to Exploring the Digital Divide study that examines teen online behavior, teens oversees and in the US are continually finding ways to hide their online activity from...
Holiday shopping is easy, convenient and it can be secure too. Here are 10 tips to a secure online shopping experience during the holiday season: Avoid spoofed websites. Common sense says any time you receive an offer via an e-mail automatically be suspicious. The same goes with offers via tweets and messages received in any social media site. Don’...
09 December 2012 /security
In a world where a Twitter tweet can be heard around the world instantly, a friend’s video on YouTube can go viral overnight, and you can speak to anyone online across the globe without using a phone, it seems backwards that the local hospital may still be keeping your medical information in a filing cabinet. This situation is starting to change, ...
03 December 2012 /security
There is no such thing as a truly secure password. There are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. Most people aren’t aware of the numerous common techniques for cracking passwords: Dictionary attacks: There are free online tools that make passw...
20 November 2012 /security
A recent story about a teen romance gone wrong, had reportedly started on Xbox. Now their parents and police say the four Iowa teens have run away from their homes. Two teenage girls from Shellsburg and two teenage boys from Atlantic went missing in what police think may have been a plotted escape. One of the boy’s mothers said, “I don’t let him h...
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw what had happened on my Facebook page last night, but someone stole my cell phone while I was at a concert, and posted all of my naked pictures off of my phone and posted them to my wall. They were up there for hours.” Apparently if you are under the age of 40 th...
15 November 2012 /security /regulation
Ever seek out information online and end up somewhere you never meant to go? I’m not talking about some website that didn’t have what you were looking for, I’m talking about a website that you REALLY didn’t want to go to or would never go to. This is the dark side of the Net. Think of it like this: when you drive, you might make take a wrong turn,...
The term “cyberattack” or cyberwarfare is defined as “politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation.” “Weapons of Mass Disruption” are a growing concern...
30 October 2012 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.