Protect Yourself from Vishing
“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your mobile phone. The term is […] more…QR Codes Could Deliver Malware
You’ve seen barcodes all your life. So you know what they look like: rectangles “boxes” comprised of a series of vertical lines. When a cashier scans a barcode, you hear a familiar beep and you are charged for that item. A QR code looks different and offers more functionality. QR stands for “quick response.” Smartphones […] more…5 Lessons Learned from RSA
A couple of weeks ago, the RSA Security conference took place in San Francisco, CA. The increasing sophistication of hackers and visibility of data breaches (including one on the conference’s namesake company last year) makes this an exciting time to be in the security business.. While this show is for corporate IT and security professionals, […] more…Jailbreaking an iPad Exposes Vulnerabilities
At the McAfee FOCUS conference in October of last year, members from McAfee Labs™ spoke about malware and other threats that affect security. One of the most popular events was when they brought an iPad on stage and did a live hack. The researchers were able to remotely watch as a user accessed his email […] more…Safe Surfing Tips For Women
Every day I spend hours exploring the net, print media and other sources for gathering information on the latest cyber threats and crimes. In all my searches, what has been standing out strongly is the rise in crimes against women on the Internet. So what better occasion than Women’s Day, which falls on 8th March […] more…Be Aware of Tax Time Scams
The Internal Revenue Service has issued its annual “Dirty Dozen” ranking of tax scams, reminding taxpayers to use caution during tax season to protect themselves against a wide range of schemes ranging from identity theft to return preparer fraud. An IRS notice informing a taxpayer that more than one return was filed in the taxpayer’s […] more…Don’t Let Location-Based Services Put You in Danger
Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and followers. Geo-location or geo-tagging can […] more…Survey Scams Find Their Way into Pinterest
Pinterest is the newest social networking site that’s steadily gaining popularity among users this year. Users can create their own “boards” where they can “pin” images or videos of anything they like. Users can “re-pin” images and videos posted by other users to their own boards or they can use the Pin It button to […] more…More information
- Intel Confirms UEFI Source Code Leak as Security Experts Raise Concerns
- Malware Sandboxing Firm VMRay Raises $10 Million
- LinkedIn’s Intro tool for iPhones could be a juicy target for attackers
- Betabot – An Example of Cheap Modern Malware Sophistication
- CISA, NSA Share Guidance on Hardening Baseboard Management Controllers
- Authorization and IAM Company PlainID Raises $75 Million in Series C Funding
- Critical vulnerability affecting HD FLV Player
- ‘I’ve never seen anything like this:’ One of China’s most popular apps has the ability to spy on its users, say experts
- Google tries to beat AWS at cloud security
- Privacy campaigners want review of Irish Facebook, Prism decisions