Image

Article Resources

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

Online Romance and Dating Scams

Roses are red, violets are blue, and we all know that not everything – or everyone – online is true. But can you tell the difference between someone who is simply using a decades-old photo and a lothario scammer trying to swoon their way to every dollar in your bank account?

 

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

Watch Out For This Tricky New Tactic Called Clone Phishing

Researchers at Vade Secure describe a type of phishing attack dubbed “clone phishing,” in which attackers follow up a legitimate email from a trusted sender with a replica, claiming that they forgot to include a link or attachment.

 

 

Read The Original Article >>

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

Manage Your Privacy Settings

Want to view or change your privacy/security settings, but don’t know where to find them? Use these direct links to update your privacy settings on popular devices and online services or read about your platforms’ privacy policies and statements.

 

 

 

Read The Original Article >>

Image Source: National Cybersecurity Alliance
Image Source: National Cybersecurity Alliance

Vacation and Travel Security Tips

As you embark upon your next adventure, remain cyber safe following some simple practices to keep your vacation plans free from cybercriminal meddling. 

 

 

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

How To Stop Job Scams

I am reading and hearing about a ton of job scams these days. So many, I wondered how anyone could get a real job or employee, especially in these days of often full-time, work-from-home (WFH) environments

 

 

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

Tips for Securing Your Mobile Devices

Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information.

 

 

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

How To Protect Yourself After A Data Breach

Data breaches seem to happen like clockwork. None of them are your fault, but the responsibility to protect yourself and your personal information rests square on your shoulders. It can seem like a daunting task, but there are some fundamental actions that can be taken right now that can make you a significantly safer from falling victim to a cyberattack.

 

 

 

Read The Original Article >>

Image Source: KnowBe4
Image Source: KnowBe4

Cybercriminal Gets 25 Years Prison Time Over Romance Scams and Business Email Compromise Attacks

A man from Atlanta, Georgia has been convicted of running romance scams and business email compromise attacks that netted him over $9.5 million, the US Justice Department has announced.

 

 

 

Read The Original Article >>

Image Source: SOS Daily News
Image Source: SOS Daily News

How Your Instagram and Facebook “Friends” Can Steal Your Social Media Account

It’s time to resurrect the old adage “With friends like these, who needs enemies?” Thanks to the nonprofit Identity Theft Resource Center (ITRC), their work has uncovered a social media hack victimizing users of Facebook and Instagram using friendship as a lure.

 

 

 

Read The Original Article >>

Scams, Scams, Everywhere!

Scammers have been around as long as history has been recorded. Think about the famous ‘Trojan Horse’ for example. A perfect scam that allowed attackers to get behind the city walls. The same is still happening, although the technology has evolved from wooden horses to digital ones.

 

 

 

Read The Original Article >>

Image Source: Federal Trade Commission
Image Source: Federal Trade Commission

Five things to do to protect yourself online

Your online accounts, computer, and phone hold a lot of your personal, financial, and health information. Information that’s valuable to you — and to scammers who try to steal it. Here are five things to do to keep hackers out of your accounts and your personal business.

 

 

Read The Original Article >>

Image Source: Federal Trade Commission
Image Source: Federal Trade Commission

Scammers are posing as your TV and internet company

Did Spectrum or another provider call with an offer to lower your monthly TV, cable, or internet bill in exchange for a pre-payment or fee? It wasn’t them. It was a scammer, and you’re not alone.

 

 

Read The Original Article >>

Image Source: PC Magazine
Image Source: PC Magazine

Is That True? 4 Browser Extensions to Help You Spot Fake News

Not sure which sources to trust when you're online? These browser extensions can help you figure out how to detect misleading articles and untrustworthy websites.

 

 

Read The Original Article >>

Image Source: Federal Trade Commission
Image Source: Federal Trade Commission

Have you been affected by a data breach? Read on

Hackers know a secret many of us share: we reuse passwords. Don’t. That’s one takeaway from the FTC’s case against online alcohol delivery platform Drizly. Here’s what to do after a data breach and why.

 

 

Read The Original Article >>

What should I do if I get a call claiming there's a problem with my Social Security number or account?

If there is a problem, we will mail you a letter. Generally, we will only contact you if you have requested a call or have ongoing business with us. The latest scam trick of using robocalls or live callers has increased.

 

 

Read The Original Article >>