Source: National Cyber Security – Produced By Gregory Evans Law enforcement officials knew him only as “The Hacker” — a mysterious person (or was it more than one?) who was stealing millions of dollars in IRS tax refunds, then vanishing like the wind — along with the money — The…
Hackers Have Just Cracked The Internet’s Most Common Security Protocol, Here’s How To Protect Yourself
Source: National Cyber Security – Produced By Gregory Evans HTTPS is everywhere you look. Most social media sites use it, YouTube uses it, it’s a basic protocol for secure email, and any website that takes a credit card uses it as a bare minimum. And unfortunately, researchers have just breached…
Don’t lose yourself: avoid identity theft on social media
Source: National Cyber Security – Produced By Gregory Evans More than three-quarters of American adults are active on social media, and the numbers total approximately 2.3-billion people worldwide. By living with and through our technology, it is easier than ever before to reconnect with friends, stay in touch with family…
Reignite Your Creativity; Challenge Yourself
It’s almost the end of the school year here in Texas, and it occurred to Matt and me that we have a habit of seeing great books recommended on our social media stream, buying […] The post Reignite Your Creativity; Challenge Yourself appeared first on EducationCloset. View full post…
As hackers become organised crime syndicates, it’s time to go threat hunting instead of waiting to defend yourself
Your ads will be inserted here byEasy Plugin for AdSense.Please go to the plugin admin page toPaste your ad code OR Suppress this ad slot. The past six months have seen the cyber threat landscape worsen rapidly. Hospitals are under siege from ransomware, breaches are increasingly moving to mobile devices…
Protecting yourself from identity theft
Source: National Cyber Security – Produced By Gregory Evans A report from Javelin Strategy & Research finds the number of identity fraud victims remained steady at 13.1 million in 2015 when compared with 2014, however it is still the second highest number of victims since Javelin began conducting its annual…
How to have yourself a merry cyber-safe Christmas
Source: National Cyber Security – Produced By Gregory Evans In 2000, Scott Culp wrote a terrific essay on computer security. It was entitled the 10 Immutable Laws Of Security. Fifteen years is a long time in cybersecurity, so it seemed like a good time to revisit these “laws” and put…
Protect Yourself from Card Fraud at ATMs and Gas Pumps
Source: National Cyber Security – Produced By Gregory Evans The Mt. Pleasant Police Department is looking through hours of surveillance video trying and find the person who put illegal card readers at a gas pump. Two illegal card readers also known as skimmers were found inside the gas pump at…
Here are 6 ways to protect yourself from credit card frauds
Source: National Cyber Security – Produced By Gregory Evans This year in September, police arrested a student from Vadodara for illegally using credit cards of three American nationals to book air tickets. In March 2013, two top officials of an online shopping portal were arrested after almost 200 complaints were…