There is a computer security threat from incoming email that has a subject line that uses the domain name of your email followed by “account notification”. It contains a malicious attachment. Do not open! The body of the email usually reads as follows: Dear Customer, This e-mail was send by…
Beware of incoming email with subject lines such as RE: hello, RE: hi RE: whatsup. The body of the email usually reads: i found your email somewhere and now decided to write you. let me know if you do not mind. If you want I can send you some pictures of me. i am a [...]
DO NOT OPEN EMAIL ATTACHMENT “ecard.exe” Do not accept the attachment. Beware of email that looks like this: Good day. You have received an eCard To pick up your eCard, choose from any of the following options: Click on the following link (or copy & paste it into your web browser):…
E-mail is insecure because it is more like a postcard, not a sealed envelope.A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the…
SANS Institute — Never leave your computer logged in when you walk away, not even for a minute. Make it a habit to log off your workstation whenever you get up. Remember to always leave your Windows computer by pressing the keyboard shortcut combination of the Windows logo key and the letter…
HARRISBURG – Attorney General Tom Corbett today announced the recent arrest of six suspected Internet predators across Pennsylvania and urging parents to make online safety part of their spring and summer family discussions. “Now, more than ever, it is important for families to discuss Internet…
A person who is standing near as you fill out a form, enter your PIN number, or punch in your calling card numbers may be doing more than just waiting their turn. To help prevent shoulder surfing, shield your paperwork from view using your body and cup your hand over the keypad. by Nitin Dewan
How do email clients work?Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server. For example, let’s assume that your email address is…
Email attachments are a common tool for attackers because forwarding email is so simple. Users often open attachments that appear to come from someone they know or an organization they do business with. Almost any type of file can be attached to an email message, so attackers have more freedom with…
WARNING: beware of email that claims to be from Facebook. The subject line usually reads like this: Facebook Password Reset Confirmation! Your Support. The body of the email reads: Dear user of facebook, Because of the measures taken to provide safety to our clients, your password has been changed.…
GameSec 2010 – Conference on Decision and Game Theory for Security 22-23 November 2010, Berlin, Germany www.gamesec-conf.org Industry Gold Sponsor: Deutsche Telekom Laboratories Industry Silver Sponsor: Frauenhofer Heinrich Hertz Institute Technical co-sponsors: IEEE Control System Society,…
Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information. How do wireless networks work?As the name suggests, wireless networks, sometimes called WiFi,…
Unsolicited commercial email may be a privacy and/or security violation under the Federal Trade Commission of the United States of America. SPAM should be forwarded to uce@ftc.gov.