May the Information Security Force Be With You. Star Wars Day happens every year, celebrating the iconic science-fiction film franchise. It’s the perfect time to celebrate these cyber security essentials, as received from “Star Wars” canon wisdom.
Cyberbullying is bullying that takes place using electronic technology, and it’s increasing every day. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.
There is no better time than now to prevent and report this disturbing trend.
If your bank account or online accounts like Gmail, Yahoo, Facebook or Twitter has ever been hacked, you should know that the cyber criminals use specific trick to get into your account. With passwords being the central theme of almost all your accounts, hackers prefer to go after your password to hack into your financial as well as online accounts.
If your account is hacked, the criminals probably used one of the 6 below given ways to crack your account. If you study these methods you can prepare yourself better to repel such hacks and control your accounts easily.
Seattle-based pet store LuckyPet notified the California State Attorney General’s office of a data breach that compromised online customer information. LuckyPet said it has not received any reports of actual misuse of any credit cards as a result of the incident and recommended that customers monitor their accounts for fraudulent activity.
On Tuesday, security researcher Troy Hunt revealed on Twitter that the millions of accounts were exposed in January, and that he was uploading the data on his website, so that users could check to see if they were exposed in the breach. As usual, the data on his website comes from website breaches which have been made publicly available.
A menacing wave of ransomware that locks up Android devices and demands victims pay $200 in Apple iTunes gift card codes is raising concern among security researchers. The ransomware attacks, they say, open a new chapter for Android vulnerabilities similar to Microsoft’s obsolete, unpatched and unsupported Windows XP operating system.
A letter sent to customers and distributors from doTERRA, the Utah-based essential oil company, is warning that an apparent data breach last month may have compromised their personal information.
The traditional meaning of people “getting taken for a ride” is that they are victims of a scam. But in the world of online ride-hailing services, the scammer gets taken for the ride – a free ride – while the victim ends up with the bill.
The latest count from the Identity Theft Resource Center (ITRC) reports that there has been a total of 269 data breaches recorded through April 19, 2016, and that more than 11.27 million records have been exposed since the beginning of the year. The total number of reported breaches increased by 22 compared to the prior week.
What could be worse than a ransomware infection? How about getting infected by crypto-ransomware that taunts you by slowly deleting your encrypted files while increasing the ransom demand until you pay for the decryption key? And don’t reboot your PC, or else the ransomware will delete 1,000 files at once as a reprisal.Continue Reading…