Stay Smart About Fake Smartphone Apps

Fraudsters go mobile 

Our smartphones send, receive and store tons of sensitive information about us. This includes the information-rich apps we have on our devices. 

With over 6 million apps to choose from across Apple, BlackBerry, Amazon, Android and Windows, a smartphone can virtually perform any function and can hold as much (or more) data as a full-sized computer. 

Of course, criminals will do what it takes to get that data. 

Fraudsters are taking advantage of the fact that many have shifted to mobile services, specifically mobile banking. If you’re like 77 percent of the U.S., you probably own a smartphone and use a number of apps available for your device.

Let’s explore why criminals are turning to fake smartphone apps, how they can exploit those apps to commit identity crimes, and ways to help you safeguard your personal information from these identity crime schemes.

Continue reading

Educational Institutions “Schooled” By Data Breaches

Educational Institutions Take on Data Breaches 

In 2016, 9 percent of all data breaches came from the education sector. While hackers may not be interested in snooping through your old grades, they’re looking for any personal information the institution has on file to commit any number of identity crimes.

Educational institutions are targeted because they hold large amounts of sensitive information. Once criminals gain access into an institution’s network, they capture your personal information from admissions applications, third-party online homework apps, campus Wi-Fi networks and more. An education data breach can also reach far and wide, affecting faculty, students and alumni alike. Continue reading

Ransomware Attack Will Make You “WannaCry”

What happened? 

On Friday, May 12, 2017, hackers launched the WannaCry (WannaCrypt) ransomware that has infected over 200,000 Windows users. The global cyberattack has already reached 150 countries.

If infected, a device will lock up and display a message demanding $300 via Bitcoin — an online currency — to restore the encrypted files. The ransom would increase over time; if left unpaid the victim’s files would be locked indefinitely.

This ransomware attack has mostly affected business networks via a security flaw in the Windows operating system. Victims using computers with outdated security patches and targeted in phishing campaigns are especially at risk. Continue reading