- February 22nd, 2017
- No Comments
Online Privacy, Online Safety
Amazon has been hit with a new scam that you need to know about before making any more purchases from them. Certain products, specifically electronics, are advertised as ‘used – like new’ and appear as legitimate deals at great prices, but in reality, is mean to scam you. When you click on these items, they will redirect you to a look-a-like page that appears exactly like an Amazon page would. They are however a phishing site meant to scam and trick you into stealing your personal information and money.
This year is coming to a close and we should prepare to protect ourselves from the innovative and imminent cyber threats of 2017. Being aware will keep you ahead of the game and ensure you’re secure and protected against all the latest threats. Learn more about some of the biggest cyber threats to look out for in the upcoming year.
Imagine the damage someone could do if they knew your Facebook password. Now imagine how much more harmful it could be if they had your banking information. Of course, you would never give over this information to a stranger, but what if they sent you an email pretending they were your bank. How would you know not to trust them then?
2015 is drawing to a close and that can mean only one thing – it’s time to make 2016 predictions! Some people like to prognosticate about which celebs will be dating; others focus on economic forecasts. Some people attempt to prophesy the outcomes of their fantasy football leagues.
Here at ZoneAlarm we extend our totally secure, all the time mantra to peering into the future as well. After all, the bad guys always have one eye on the future, so you should too if you want to stay safe.
To that end, we bring you ZoneAlarm’s predictions for the top 4 PC threats in 2016. These threats are already active, but they seem to be ramping up their game in an alarming way and all of us need to be prepared for them.
Social Engineering is a pretty hot topic nowadays. It seems like every time you turn around there is another story about a major corporation, important person or institution whose data has been compromised. Often, these hacks began with an email that shouldn’t have been opened, or the revealing of information that should never have been told.
No, these attacks are not the brainchild of some evil tech genius, cranking out infected code and overrunning systems with malware. Rather, they are the results of an art that dates back as far as human existence, when the first cave man convinced the second cave man that it was entirely worthwhile to trade his woolly mammoth for a handful of rocks.