Collaborative Information Site

Online Security

Easy Ways To Protect Your Privacy On Google Chrome

Internet world is not secure at all. You need to be extra careful while accessing internet. Google knows more about you and understands how critical is your web security. You don’t know, people can track each and every click you make on the web if you are not going through the right security measures, especially your bank account details which you generally share through your google gmail account or any website you use, in which you share your highly important business information.

Click here to continue reading...

continue reading
1 visits |0 Comments|Reply

IRS Dirty Dozen Phishing, Phone Cons and Identity Theft Lead Scam List For 2017

“This is one of the most dangerous email phishing scams we’ve seen in a long time. It can result in the large-scale theft of sensitive data that criminals can use to commit various crimes, including filing fraud  tax returns. We need everyone’s help to turn the tide against this scheme,’’ said IRS Commissioner John Koskinen in a statement.

 

 

In addition the latest Phishing Trends and Intelligence Report, which has data about January 2016, says that the IRS phishing sites spotted in that one month totaled more than the IRS phishing attempts seen during all of the previous year. While the numbers for January aren’t in yet, PhishLabs researchers expect yet another spike.

continue reading
1 visits |0 Comments|Reply

IRS Dirty Dozen Phishing, Phone Cons and Identity Theft Lead Scam List For 2017

The Internal Revenue Service rounded up some of the usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year.

 

“This is one of the most dangerous email phishing scams we’ve seen in a long time. It can result in the large-scale theft of sensitive data that criminals can use to commit various crimes, including filing fraud  tax returns. We need everyone’s help to turn the tide against this scheme,’’ said IRS Commissioner John Koskinen in a statement.

 

In addition the latest Phishing Trends and Intelligence Report, which has data about January 2016, says that the IRS phishing sites spotted in that one month totaled more than the IRS phishing attempts seen during all of the previous year. While the numbers for January aren’t in yet, PhishLabs researchers expect yet another spike.

 

continue reading
2 visits |0 Comments|Reply

Cyber Security on February means romance...and romance scams: BBB offers tips to avoid

As the month when Valentine's Day falls on the calendar, February has a reputation for being "prime time" for romance. It's also definitely a time when scammers seek to prey on those searching for romantic interests online. Better Business Bureau of Minnesota and North Dakota (BBB) advises people to proceed with caution before they let their hearts—and their finances—get tangled up in a romance scheme.

 

 

Romance scams can happen to anyone. You meet someone who seems like a match online, you get to know them, and everything appears to be going well; however, you aren't able to meet in person for some reason (due to issues they claim such as distance, military deployment, work travel, etc.). Then suddenly your online love interest claims they're in desperate straits and asks you to wire money, or says they can come to meet you but need you to wire funds for the airline ticket. Be aware that these are classic signs of a romance scam, and if you dip into your own pockets once, he or s

continue reading
2 visits |0 Comments|Reply

Security and risk complaints online: Police launch bid to tackle dating fraud

Scotland Yard have teamed up with charities and other forces across the capital amid a spike in fraud linked to dating websites and apps.

 

According to City of London Police one victim reports scams linked to romantic liaisons every three hours.

 

Scam victims lose an average of £10,000 in the UK with almost all fraudsters demanding their targets transfer money within the first month of contact.

 

 

The two police forces, alongside charities Age UK and Victim Support have urged those looking to romance to follow dating tips in order to avoid financial misery.

 

 

Read more

continue reading
2 visits |0 Comments|Reply

Online Fraud Detection on Western Union settlement highlights risk of wire transfer scams

 

The median loss on frauds involving money transfers was $600 last year, twice as much as 2015, according to fraud.org.

 

Around 39,000 Texans will receive restitution for wire fraud scams involving Western Union in a $586 million settlement announced by the U.S. Department of Justice last month.

 

The settlement is on top of a $5 million settlement reached last week with Texas and 48 other states over the same issue — complaints by people who used Western Union’s wire transfer service to send money to third parties who were involved in schemes to defraud them.

 

In both cases, Western Union, the largest money service business in the world, has agreed to implement an anti-fraud program that includes mandatory training of its agents on fraud-induced wire transfers, heightened anti-fraud procedures and other measures to prevent scams through its wire service.

 

Read More

 

continue reading
2 visits |0 Comments|Reply

Online Security - What is Pharming and how can you Prevent this Online Fraud?

When we look around we are amazed at the speed with which the world is changing. Online fraud techniques such as Pharming and other cyber-crime attacks are at all time high. To overcome such challenges, we need to at least have some basic understanding of these terms. The intention of this informational document is to approach the problem with a solution.

 

What is Pharming

 

Pharming redirects Internet users from legitimate websites to malicious ones using a strategy called DNS Cache Poisoning – where corrupt data is inserted into the cache database of a DNS.

 

The attacker uses several ways to carry out pharming attacks, one of the most popular way is to modify the Host file. The Pharmer covertly hijacks your computer and takes you to a forged website. Your browser may display the legitimate URL, but you will not be on the legitimate server. This, in most cases, is a page that looks identical to that of your bank, financial institution or online shopping websites like, eBay, or

continue reading
2 visits |0 Comments|Reply

Cyber security: Cyber crime: an unprecedented threat to society?

In the last year cyber crime has been firmly established as one of the biggest threats to democracy, privacy, and health and safety. Here, Simon Townsend chief technologist EMEA at Ivanti Software discusses this threat and the possible ways to circumnavigate it

 

What cyber security trends from 2016 did you see?

 

Ransomware, ransomware, ransomware! Not only this, but 2016 was also year of insider threats. Email continued to be the main route of entry, with phishing scams running rife in organisations.

 

 

Ransomware got its own stage in 2016: in 2015 many people were mixing the attack up with other methods of entry or it wasn’t on the agenda for many decision makers. However, now it’s not something just for certain high-profile organisations, it’s a problem for everybody.

 

Read more

continue reading
3 visits |0 Comments|Reply

Cyber Security - How To Spot Malicious Emails From Hackers

Malicious emails are one way that hackers try to get access to your private information. If you receive a spam email, you should delete it immediately — do not open any attachments or click any links. It only takes one wrong click, and hackers can gain access to your entire computer.

Spammers are getting smarter when crafting malicious emails. But many messages are still riddled with grammar and spelling mistakes. Read the subject line and first few sentences of the email to determine if the email uses broken language or text not related to the purpose of the email. Here is an example of misspellings in a real malicious email: “Confirm your e-mail by filling out your Login Information below or your account will be suspended within 24 hours for security reasons.” Other examples of messages with broken language include “Verify your account now to avoid it closed!!!” and “Warning!!! Account owner that refuses to update his or 

continue reading
4 visits |0 Comments|Reply

Online Security The Email Edge: The New Cyber Crime

An email pops up in your inbox, saying you have a date in court. And it uses your first name. Pretty alarming, no? Not to worry — courts don’t communicate that way. It’s a scam — a variant of one that apparently has spread from Australia and the UK. But the purpose isn’t to bilk you out of money — it’s to steal your identity and get you to click on malicious links.

 

Welcome to the new spam, a phenomenon that threatens consumers and companies alike. Such schemes have long existed, but they are now more insidious, thanks to improved technology and the boundless creativity of the perpetrators.  

 

For example, the Internal Revenue Service warned this week that thousands of taxpayers’ W-2 records have been compromised. 

 

“This particular scam, sometimes referred to as business email spoofing (BES), reportedly first appeared last year, said the IRS,” PYMNTS.com reports. “Cybercriminals send emails to employees in payroll and human resources (HR) using slightly modified email addres

continue reading
2 visits |0 Comments|Reply