2016

June 24, 2016
Comments [0]

Some passwords are funny. Some are pretty weird. Some can be a math problem. Many can be laughably easy to hack (I give you “dadada, ”“qwerty,” “password” and”123qwe” to name a few.) — or very tricky. But one thing is for sure, they are never really 100 percent hack proof.

Earlier this month, news broke that a significant number of Twitter passwords had been compromised and were being offered to anyone willing to fork over 10...

Read More
June 21, 2016
Comments [0]

If you purchased something on computer manufacturer Acer’s website over the last year, your credit card information may have been stolen.

Hackers made off with the names, addresses, card numbers, expiration dates and three-digit security codes of a reported 34,500 customers. So far, there is no reported evidence that usernames or passwords were compromised during the unauthorized third-party access.

... Read More
June 14, 2016
Comments [0]

How prepared are you to deal with cyber threats? Is your organization’s email security sophisticated enough to detect and deflect the best spear-phishing or whaling attacks? Do you feel confident you are safe—or as safe as you can be?

The answers to these questions often are torn between your perceptions of security and the reality of it. This gap between the two exposes some major vulnerabilities, ranging from how much of an...

Read More
June 13, 2016
Comments [0]

By Jill Krasny

With the 2016 Summer Olympics just around the corner, scammers are getting busy with various schemes to dupe fans.

Here are some of this year’s Olympics scams to watch out for.

Phishing Attacks 

It’s the old-school scam in an unfamiliar package, this time masquerading as an email that appears to be the original marketing...

Read More
June 11, 2016
Comments [0]

By Brooke Niemeyer

Facebook CEO Mark Zuckerberg apparently didn’t read the warning about using different passwords to protect online accounts.

Sources told The Wall Street...

Read More
June 10, 2016
Comments [0]

Summertime offers an endless list of ways you can take it easy, unless it’s doesn’t. It’s also moving time.

Whether we’re talking about college kids coming home for a few months or simple relocation, there’s nothing relaxing about a move — or simple. Get it wrong, and you become vulnerable to identity theft and other forms of fraud.

For most people, moving is sufficiently stressful, without...

Read More
June 7, 2016
Comments [0]

It’s a sad reality: when military personnel are away for long periods, criminals often target their identities.

Compared to the rest of consumers, military personnel experience, “28 percent higher rates of new-account fraud and 18 percent higher rates of familiar fraud,” according to Javelin Strategy & Research. New account fraud happens when someone obtains new credit using your personal information. And familiar fraud is when someone you know, such...

Read More
June 3, 2016
Comments [0]

Over the past few years, we’ve experienced more ginormous data breaches than any of us can, or would even care to, remember. Against this backdrop, reflect upon the fact that political campaigns know as much, if not more, than advertisers about us — what inspires us and what will move us to vote.

The Wild West

Consider the various kinds of information a campaign crunches to determine who might be persuaded into...

Read More
June 1, 2016
Comments [0]

By Brooke Niemeyer

Skimming is a fairly common scam, which involves thieves placing a device over an ATM or other payment terminal that steals debit or credit card information from any cards used at that machine. But criminals are taking this one step further thanks to Russian-speaking Skimer group.

...

Read More
May 25, 2016
Comments [0]

Your identifying information is valuable to identity thieves who aim to use it for profit.

Find out which personal information is the most valuable, learn the telltale signs of fraud, and discover how to protect yourself in our latest infographic.

...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started