Archive | Security

RSS feed for this section
shutterstock_516803317_scam_cropped

The surprising way you might connect with scammers

Even if you’re a guard dog about your online social media privacy, there’s one place you might have overlooked. It’s a site where you tend to accept new connections from people you don’t know, where you share a lot of information about yourself and your personal history, and anyone on the site can see your entire profile. Did you figure it out?
Read full story
Twitterprivacy

It’s time to review your privacy settings on Twitter

Twitter is looking for new ways to produce revenue and remain relevant to users and advertisers – and you might not like their latest effort. Twitter just implemented new tracking settings that many users are less than thrilled about. If you’re a tweeter and automatically accepted the recent change to the privacy policy, you might want to take a closer look.
Read full story
shutterstock_640583200

You’ll wanna cry at the rise in ransomware

Last month’s WannaCry ransomware attack took the world by storm, making lots (and lots and lots) of people want to cry. While that particular attack has now come and gone, ransomware as type of malicious software isn’t going anywhere. Fortunately, there are four simple and consistent things you can do to be less vulnerable to ransomware.
Read full story
Phishing concept

Scam alert: DocuSign phishing attack

DocuSign has acknowledged a breach of their customer and user email addresses. As a result, the email addresses are now the target of a malicious email campaign. TDS is encouraging customers to be cautious. If you receive an email from DocuSign, with an attachment or link, be careful. For more information, contact DocuSign.
Read full story
Phishing concept

Clever Gmail login scam is still tricking people

We’ve told you about phishing scams before, and even scams that take advantage of your misspellings or fat-finger moments—but this one? It may just take the cake in terms of sneakiness. If you have a Gmail/Google sign in, listen up (and don’t open any attachments until you read this). But even if you don’t have a Google login, this kind of technique could be used for other services so keep reading.
Read full story
alert

Security Alert: Cloudbleed vulnerability exposes sensitive data across the internet

A new security vulnerability has hit the web you should know about. This code error may have caused passwords, messages, cookies and more to leak onto the internet. While there’s reason not to panic, there are steps you should take to protect yourself.
Read full story
Password by Graphics Mouse

How crackable is your password?

We may scoff at those who actually use the word “password” as their password (or "123456"), but we probably shouldn’t be too smug. After all, are your passwords really any good? They may not be nearly as awesome as you think.
Read full story
cordless telephone_cropped

Phone scam: whatever you do, don’t say “yes”

Reports of a new phone scheme have been hitting media outlets (including USA Today and CBS News) for the last few days. It’s being coined the “Can you hear me?” scam and it may take only one word to fall for it. We have what you need to know.
Read full story
data-privacy-day._widejpg

7 ways to celebrate Data Privacy Day (yes, really)

Admittedly, on the surface, Data Privacy Day doesn’t seem super exciting. There’s no themed merchandise, no cards to purchase, and no special foods to make—but there is a gift to be given. By celebrating this unlikely holiday, you can give yourself the gift of control. Specifically, control over your personal information and when, and with whom, you share that data.
Read full story
Phishing concept

Five ways to spot a phishing scam

It's called "phishing" because cyber criminals try to lure you into their trap, often using a legitimate-looking emails, hoping you take the bait. Their goal? To trick you into revealing account numbers and payment information. The REAL trick is being alert and knowing what to look for so you don't fall for this kind of scam. Since most phishing emails have some common elements, they're easy to spot once you know what to watch for.
Read full story