You may have heard of the Adobe hack which
was declared at the beginning of October. At the time Adobe estimated that almost
3 million personal details had been
compromised. Just a few days ago the company said that hackers had gained
access to 38 million encrypted accounts including credit and debit card
Researchers at the UK’s University of Sussex have discovered how to hack into contactless payment cards, also known as near field communications. The process, known as skimming, was carried out with off-the-shelf equipment bought from a hardware store.
Spooks, ghouls and creepy things are set to
ascend into the world of the living as Halloween is celebrated the world
over. Never mind that the original
meaning of the celebration was intended to honour the Christian faithful who had
left this world of dense matter, it’s much more fun to dress up and pretend to
be an incarnation of evil, while bagging some sticky, sickly sweets at the same time.
Dropbox is an extremely popular online file sharing service with something like 175 million users. And it’s now being targeted by cyber criminals who are using well-known malware to try and steal financial details.
We take a look at the websites and trading platforms hackers and criminals use to buy and sell stolen credit cards, as well as drugs, guns and just about any other illicit item you can think of. It’s a revealing read and one that illustrates how important identity protection is.
To post or not to post? That is the question. We all love sharing funny and adorable parts of our lives on Facebook, but when it comes to your new born, or toddler, is it safe?
It can be tough parenting kids in the social media age. You want them to have the freedom to explore and learn but you’re also aware of the potential online threats they face. How do you protect them while also allowing them to have fun?
The interest rate on your credit card may be high but the price paid for your credit card details is very low. The market for credit card information is large, the profits are huge and the clientele are hungry. And just because you can’t see it, doesn’t mean it doesn’t exist. If you’re not engaging in identity theft protection you might be in for a nasty shock.
Bullying is nasty. Online bullying is even nastier. The perp hides behind a cloak of anonymity while the victim weeps onto their key board and disintegrates inside. It’s not ok, it needs to be stopped and here’s some advice on how to do just that.