How often do you reconcile your checkbook? Studies show that most of us don’t check our bank account often enough and that there is a significant part of the population who still use checks to pay bills. Yet, we still don’t realize the amount of effort it takes to deal with a compromised bank account. …Read more
As many of you head out on vacation before school starts, you may find that obstacles outside your control threaten your trip. Weather and airline delays are two such examples. Many obstacles, however, are within your sphere of influence. Cyber preparedness is one of them. The following tips will ensure a cyber worry-free vacation no …Read more
In the past, we’ve talked about phishing emails that contain a hyperlink to malicious websites. Traditionally, these are identifiable through boxes, buttons or phrases within the email. When you move your cursor over them, the cursor changes to the hand and displays the content of the URL. This week’s sample email represents an old but …Read more
I’ve covered the use of social media in social engineering attacks a number of times. Statistically, social media continues to be a starting point for crafting elaborate social engineering or phishing attacks. Let’s run through a refresher. Sharing too much private information on social media is dangerous. If you’re not sure what to share, follow …Read more
There are two schools of thought around unsubscribing from unsolicited emails. Some say do; others say don’t. Recently attackers have been abusing legally required unsubscribe links to lead you to malicious sites. In fact, most hyperlinks in emails get abused over time. If you had asked me five years ago whether you should unsubscribe, I …Read more
Few things in our fast-paced society are as time tested as the real estate closing process – but going “e” makes the relocation process quick and convenient.