- May 14th, 2014
- 6 Comments
Mobile Security, PC security
Imagine you’re trying to log into your online banking account. Rather than being directed to the page you’ve requested after entering in your User ID and password, an additional field appears and asks you to enter your debit card information, social security number, driver’s license, and other personal information. You check the URL of the website, and it’s verified to be from your bank.
If you entered in your personal information, you’ve likely become a victim of a man-in the-browser attack. And it only gets more problematic from here. In this case your PC, not the bank’s website, has been compromised by malware.
Continue Reading… The Man-In-The-Browser: It Hungers For Your Online Credentials
Malware is everywhere. You can get infected by opening up a rigged attachment in your email, or by visiting a booby-trapped website that automatically downloads malware on to your computer. Once infected, your computer can turn into a zombie, being remotely controlled by criminals to attack other computers. Criminals may steal your personal data or use your computer for nefarious activity.
While you need to take precautions to prevent getting infected in the first place, such as running an up-to-date security software, it’s also important to know how malware works and how they spread. There is a lot of misinformation out there, so here are some of the myths about malware you shouldn’t believe.
Continue Reading… Five Myths About Malware You Need to Know
Anyone who has ever used the Internet has looked up at their browser’s address bar and noticed a series of letters that either looks like this ‘HTTP’, or like this ‘HTTPS’. At first glance, it may seem like it’s just the letter S. In reality though, it is much more complicated than that.
Continue Reading… HTTPS: The S is More Than Just a Letter
Unfamiliar messages. Passwords that no longer work. These are just two of the many clues that cybercriminals have gotten a hold of your password and broken into your account.
With the password compromised, the first step is to regain control over the account by changing passwords and checking configuration settings to make sure nothing has changed. However, if the root problem (how the passwords were successfully stolen) is not fixed, then the accounts will just get compromised again and again. That’s why it’s important to take your passwords seriously and to make sure they are strong.
Continue Reading… Why You Should Take Your Passwords Seriously