Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have dozens (or in my case hundreds) of online accounts and mobile apps that require one. So it’s no surprise that people have adapted some coping strategies to make passwords memorable yet distinctive. The most common mistake consumers made, ...
Read Blog
Cybercriminals are adopting complex and powerful techniques to "hack," or take control of online accounts belonging to other people or organizations. Often, they do this by identifying the passwords belonging to an account user. This used to be a complicated task, but, as The Atlantic notes, discovering passwords today can be as simple as running ...
Read Blog
Late last week, Walmart alerted the public to an email-based scam that used the company’s name (misspelled as “Wallmart”) to illegally gather information about users. The email sported the title “Thanks for your Walmart.com order,” and after confused users clicked on links within the emails, their Walmart accounts were charged. While local police departments and ...
Read Blog
Last week during his keynote speech at the Interop IT conference, PayPal’s Chief Information Security Officer Michael Barrett pointed to a slide depicting a tombstone for passwords with the dates 1961-2013. According to Barrett, while passwords are still required for so many applications and services, they have simply outlived their usefulness. Barrett predicted that we ...
Read Blog
A denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker’s botnet, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn’t much for a user like you or me to see beyond an “error” ...
Read Blog
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites among their top search results. This malware (or malicious software) can include sites infected with viruses, Trojans, computer worms, and more, making it extremely important for consumers to pay close attention to what they click. ...
Read Blog
According to a recent survey, nearly half of all consumers believe that their smartphones and other mobile devices are less secure than their laptop or desktop computers.  In the same survey, only 36% of respondents said they trust online retail sites to keep their personal data safe. Still, holiday shopping from mobile phones increased by ...
Read Blog
A new threat has surfaced targeting users in Korea and Japan, but this attack, unlike others making the news, is not one motivated by political or ideological dogma. Instead, this one is based purely on old-fashioned greed. Vertu phone owners or those looking for a localized Vertu theme in Korean or Japanese for an Android ...
Read Blog
Every year around tax season, we see a huge spike in tax-related social engineering attacks. Social engineering is a type of cyber attack that attempts to psychologically manipulate users, tricking them into downloading malicious software or divulging confidential information. Very often, these attacks take the form of a fraudulent email created to mimic an email ...
Read Blog