Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…Here’s How to Steer Clear of Bot Accounts on Social Media
“Congratulations, you’re a winner!” “Did you know this public figure is trying to make your life worse? Click here for what they don’t want you to know.” “Save thousands today with just one click!” Spam and bot accounts on social media are everywhere. You’ve likely encountered messages like these that attempt to get you to […] more…The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you did everything right, you may still have a few doubts kicking around. Did I file correctly? Did I claim the right deductions? Will I get audited? As it turns out, these are the very same […] more…Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis
Last month, some of the usual cast of online scammers and malware miscreants promised to refrain from attacking healthcare organizations or exploiting them during the COVID-19 crisis, showing a sense of honor unexpected from ransomware attackers and cryptocurrency thieves. However, this ceasefire turned out to be a head-fake. Within a week of those vows, malware […] more…How to Steer Clear of Tax Season Scams
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of […] more…Don’t Take the Bait! How to Steer Clear of Tax Time Scams
For cybercriminals tax time is the most wonderful time of the year. They are in the shadows giddy, eager, and methodically setting a variety of digital traps knowing that enough taxpayers take the bait to render their efforts worthwhile. Indeed, with the frenzy of online tax filings, personal information (and money) moving through mailboxes, and […] more…6 Ways to Help Kids Steer Clear of Cyberbullies During Summer Break
Wouldn’t it be nice if kids could leave the veiled threats and cutting words behind when the bell rings for summer break? Unfortunately, bullies rarely take a break from intimidating others over the summer and may even step up their game. To date, nothing has humbled me quite like this parenting gig. Once upon a […] more…Adware program Vonteera blocks security products with simple Windows UAC trick
A well-known adware program is preventing users from installing antivirus products by leveraging a Windows feature that was designed for security. The program, known as Vonteera, abuses the digital signature check performed by the Windows User Access Control (UAC) for executable files. UAC prompts users for confirmation whenever a program wants to make a system change […] more…Free iPad 3 Scams Steer Users to Bad Sites
Scammers have snatched up the opportunity to victimize people by leveraging the interest and anticipation over the upcoming release of iPad 3. Just days before its supposed launch, we have noted several posts on Facebook that claim to give away free iPad 3s to some “lucky” users. Unlike previous Facebook threats we’ve blogged recently, this […] more…Application Security Protection for the Masses
I’ve always found it entertaining that so many sales pitches are essentially a listing of features for the product or service being sold. The reason I find this entertaining is that for anyone who has worked on the customer side or has ever listened to customers, it is obvious that customers buy solutions, not products. […] more…New Year, New You: Start Fresh With McAfee Protection Score
Are you an online oversharer? Do you give your full birthday to all your online shopping accounts? Have a few companies you have accounts with been breached but you didn’t take any action at the time? If you have bad digital habits, now is an excellent time to reset your digital presence. In isolation, these […] more…Start the New Year Right With This 3-Step Digital Detox
Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st promise looks different to everyone: snacking less often, going to the gym more often, drinking more water, drinking less soda, etc. This year, instead of a juice cleanse subscription, opt for a healthier habit that’s not an unappetizing shade […] more…‘Tis the Season for Holiday Scams
This time of year, the air not only gets chillier but a bit cheerier for everyone … including online scammers. Holiday scams are a quick way to make a buck, and cybercriminals employ several holiday-themed schemes to weasel money and personally identifiable information (PII) from gift givers. Here are three common holiday scams to watch […] more…Unwrapping Some of the Holiday Season’s Biggest Scams
Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some of their nastiest cons as people travel, donate to charities, and simply try to enjoy their time with friends and family. Unfortunate as it is, scammers see this time of year as a tremendous opportunity to profit. […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices in a not-so-fun way. Known as a monkey-in-the-middle or man-in-the-middle attack (MiTM), it’s a type of cybercrime that can happen to anyone. Here’s everything you need to know about mobile MiTM schemes specifically, how to […] more…More information
- A Killer Combo: Critical Vulnerability and ‘Godmode’ Exploitation on CVE-2014-6332
- Saviynt Raises $205M; Founder Rejoins as CEO
- Resolved: Meeting@PennState service connection problems Jan. 4th, 2013
- Gov Report Warns UK Telecoms May Face Security Risk from Huawei
- Android 12’s quietly important privacy progress
- Researchers show how a major GPS flaw could allow terrorists to hijack planes
- Microsoft Word CVE-2015-0064 Memory Corruption Vulnerability
- Gartner: Network virtualization will lead to security control changes
- “Back to basics” as courier scammers skip fake fees and missed deliveries
- APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure