Blog Posts Tagged with "scams"

69dafe8b58066478aea48f3d0f384820

Facebook Continually Plagued with Malware and Scams

April 05, 2011 Added by:Headlines

"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Ten Social Media Security Considerations

March 30, 2011 Added by:Robert Siciliano

Social media security issues involve identity theft, brand hijacking, privacy issues, online reputation management, and provides opportunities for criminals to “friend” their potential victims, creating a false sense of trust they can use against their victims through phishing or other scams...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Phones are Being Hacked and Cloned

March 24, 2011 Added by:Robert Siciliano

Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. The bad guy simply uses an interceptor, hardware, and software to make a phone exactly like yours...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The Seven Deadly Sins of Cybercrime Victims

March 23, 2011 Added by:Global Knowledge

Cybercriminals are skilled at identifying their targets’ weak points. Today’s increasingly online and social world offers a host of techniques for preying on potential victims and their weaknesses. Following are seven weaknesses that you need to watch out for to avoid falling prey to these scams ..

Comments  (0)

37d5f81e2277051bc17116221040d51c

Be Careful Of Earthquake Related Charity Scams

March 21, 2011 Added by:Robert Siciliano

When a natural disaster hits, most people get an urge to help those in distress. Our want/need/ability to help out comes from thousands of years of communal living as an interdependent species. However, natural disasters also bring out the worst bottom feeding sleazebags who smell blood...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Ever Present Credit Card Scam

March 19, 2011 Added by:Robert Siciliano

Flaws in the system used to issue credit facilitate new account fraud, since creditors often neglect to fully vet credit applicants with technology as essential as device reputation. Account takeover requires nothing more than access to credit card numbers...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Top Five Online Scams

March 16, 2011 Added by:Robert Siciliano

Phishing continues to become more sophisticated, more effective, and more prevalent. In one example, criminal hackers waited until Pennsylvania school administrators were on vacation, then used simple money transfers to liquidate over $440,000 out of the districts accounts...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Tax Related Identity Theft Scams Up 300%

March 13, 2011 Added by:Robert Siciliano

A recent Scripps Howard News Service investigation analyzed more than 1.4 million ID theft records from the U.S. Federal Trade Commission from 2005 through early 2010. In it they found that fraud complaints about stolen tax return-related identity theft jumped nearly 300 percent...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Beware of PC Remote Access Assistance Scams

March 11, 2011 Added by:Robert Siciliano

Criminals almost duped a man into handing over remote access to his computer, along with all his personal and financial information. The so-called technician started by telling the man his computer had sent an error message to Microsoft and he was calling to help him rectify the problem...

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

How to Avoid Falling For Social Engineering Attacks

March 11, 2011 Added by:Brent Huston

You have to be sharp to see through a social engineering attack. The challenge is to retain that sharpness while in the midst of multiple tasks. Most of the time, the attacker will take advantage of a busy receptionist, a chaotic office, or tired staff when they try their dastardly deed...

Comments  (2)

65d49ca4cbc75b022e39535c917d55d1

Do Issuing Banks Have Nothing to Lose to CNP Fraud?

March 03, 2011 Added by:rebekah donaldson

Costs for the card issuing bank are an average of $15 per transaction, plus fees assessed for each chargeback. More, in fact, than the maximum $10 charge that the acquirer had to eat. Across more than 1 million fraudulent transactions in this single case, that’s over $15 million...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

College Suffers from Digital Identity Theft

February 28, 2011 Added by:Headlines

Problems surrounding the protection of a digital identity are not just a matter of concern for individuals, as businesses and private organizations are also subject to the threat of "identity theft" by criminal enterprises...

Comments  (0)

37d5f81e2277051bc17116221040d51c

mCrime Perfectly Positioned to Pounce in 2011

February 28, 2011 Added by:Robert Siciliano

The initial concerns involve rogue apps and phishing messages designed to extract credit card numbers and login credentials. As mCrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Does Device Reputation Protect Me?

February 16, 2011 Added by:Robert Siciliano

Device reputation spots online evildoers by examining the computer, smartphone, or tablet they are using to connect to any website. If a device is recognized as having previously committed some type of unwanted behavior, the website has the opportunity to reject the transaction...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Big Game Scores Big For Scammers

February 06, 2011 Added by:Robert Siciliano

On Super Sunday weekend much of the scamming taking place is designed to separate the public from their money using the Big Game as the lure. People are seeking information on the Game and are being tackled by criminals who steal the ball...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Small Romanian Town Has Become Cyber Crime Central

February 03, 2011 Added by:Headlines

A fascinating article explores how a small Romanian town has evolved to become an international center for cybercrime operations. In Râmnicu Vâlcea, a remote village in the Southern Carpathian foothills, online predatory networks have brought a flood of new wealth to the once agrarian community...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »