73 Results from 2015
Robert Siciliano Security Analyst at Safr.me
Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013. Little did he know that his assistant would end up stealing checks from his trust account, forging her signature on them, and opening three credit cards—all in his ...
31 December 2015 /security
Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS! The Giants: Facebook and Twitter Be careful what you post on Facebook and tweet about. It can be used against you in court, even so...
24 December 2015 /security
The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents with dementia? If you fear that apps for “spying” might get banned, here’s bad news: U.S. ...
20 December 2015 /security
Thinking of bringing a credit card with you on your travels? You can end up in a jam: You just treated your extended family to fine dining in France. Time to pay; your credit card is declined. If you try to make a purchase overseas, your credit card company might think it’s fraudulent, since it would appear anomalous, relative to your usual, U.S. p...
16 December 2015 /security
So what will you be doing this holiday season to avoid getting scammed? The scammers really come out of the woodwork during the holidays, waiting to snatch their victims. It’s easier than you think to avoid getting ripped off or getting your entire bank account sucked dry. Here’s how to avoid getting tangled in a scammer’s net: Always inspect eve...
10 December 2015 /security
So, who’s on your holiday gift list this year? That list is a lot longer than you think; consider all the names of hackers that have not yet appeared on it. Scammers will do whatever it takes to get on your holiday gift list! Here’s how to keep these cyber thieves out of your pocket: Before purchasing from a small online merchant, see what the Be...
01 December 2015 /security
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently you post on your Facebook page...
28 November 2015 /security
A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security. But whom better to ask than a burglar, right? Same with a company’s computer systems: The best expert may be the black hat...
20 November 2015 /security
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner realizes that company use of employee mobile device...
16 November 2015 /security
It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s networks 150 times; they...
11 November 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.