Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…More information
- Is DROWN a ‘Hello Kitty’ SSL Vulnerability?
- Threat Landscape for Industrial Automation Systems, H2 2016
- Apple is replacing some 13-inch MacBook Pro batteries
- Resolved: Web Authentication Testing
- Pixel 5a leak shows a headphone jack, flat screen, and a familiar design
- Microsoft Internet Explorer and Edge CVE-2016-0111 Remote Memory Corruption Vulnerability
- Trend Micro Protects Users Against Active Exploits on Latest Internet Explorer Vulnerabilities
- Prevent malware attacks on social networks: 3 tips
- Advantech WebAccess Flaws Allow Access to Sensitive Data
- CISOs, it’s time to bury the hatchet with your CIO