Blog Posts Tagged with "scams"
November 28, 2011 Added by:Robert Siciliano
Whether you like it or not, the Christmas machine arrived well before Thanksgiving — at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers...
November 16, 2011 Added by:Allan Pratt, MBA
Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. Here are some tips to stay safe on the largest online activity day of the year...
October 26, 2011 Added by:Ben Rothke
So why would anyone in their right mind buy something that is free? It seems that indeed there's a sucker born every minute and they are buying books by Kevin Roebuck. If buyers would do the slightest bit of analysis, they would see this deception.Unfortunately, Emereo is polluting the waters...
September 10, 2011 Added by:Kelly Colgan
Osama bin Laden’s death wasn’t a day old before hackers moved in, flooding social network sites with spam—links that promised images of the al-Qaeda leader but that led to corrupted Flash plug-ins. Today's 10th anniversary of the 9/11 attacks will be no different...
August 25, 2011 Added by:Headlines
The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...
August 19, 2011 Added by:Headlines
The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...
August 11, 2011 Added by:Headlines
FINRA found that Citigroup failed to detect or investigate a series of "red flags" that upon further inquiry should have alerted the firm to the improper use of customer funds, including reports reflecting suspicious transfers of funds between unrelated accounts...
July 25, 2011 Added by:Headlines
"Be cautious when clicking on breaking news trends and stories within search results related to the Oslo tragedy. Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts..."
July 25, 2011 Added by:PCI Guru
These sorts of actions by organizations just add fuel to the fire for critics to use as another argument as to why the PCI compliance programs are pointless and organizations should not bother with complying with any of the PCI standards...
July 21, 2011 Added by:Robert Siciliano
Once Kate went through this process, she regained control of her account within minutes. But the criminal had deleted every single email, leaving her with nothing. He’s probably going through those messages now, searching for any useful personal information...
July 19, 2011 Added by:Anup Shetty
Hardware tampering on handhelds are tough to crack unless multiple cases lead to the fraudsters. Awareness and regular tracking one's card accounts leads to detection. The next time you swipe your card at a tacky joint that, be sure to be more vigilant on your account...
July 19, 2011 Added by:Robert Siciliano
Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...
July 17, 2011 Added by:Rebecca Herold
When I asked him why he called me in particular, he tried to avoid the question. I persisted. Finally I asked him if Microsoft had contracted his company to call me. He then said, “Yes! My company was subcontracted by Microsoft to call me, and that is how I got your information...”
July 10, 2011 Added by:Ben Rothke
It is the common opinion of industry experts that Evans and his company have little real knowledge beyond pedestrian hacking techniques found in plagiarized books and beginner hacking texts. LIGATT offers products that are simply bloated version of common tools such as ping and nmap...
July 10, 2011 Added by:Robert Siciliano
McAfee’s most unwanted criminals include pickpockets, Trojans, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. The key is awareness, vigilance, and investing in products and services that are designed to protect you...
June 30, 2011 Added by:Christopher Burgess
Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. Recently, one slipped through my filters. I've taken the liberty to identify each item within this phish, which seems fishy...
How Businesses Can Reduce Wearables Security... manthan rathod on 04-09-2015
Lessons From Hillary Clinton's Email Securit... manthan rathod on 04-09-2015
New Facebook Worm Variant Leverages Multiple... manthan rathod on 04-09-2015