Tag Archives: passwords

Safe Online and Mobile Banking

thinkstockphotos-475493648-1-450x337
Safe Online and Mobile Banking

Online and mobile banking are very convenient, but they can create risks if not managed carefully. While your bank employs the highest security measures to keep your account safe, you must protect your devices, passwords, and personal details when using online and mobile banking platforms.

The following tips may help you protect and safeguard your information:
  • Never disclose passwords or other personal information in response to an email, phone call or letter purporting to be from Trustmark or another financial institution. Banks will never request this information.
  • Always use a secure internet connection to connect to your bank. Look for ‘HTTPS’ at the beginning of the address and the padlock symbol in the browser frame.
  • When banking from your desktop, type your bank’s website address into your browser instead of following a link or a bookmark, as they can be compromised.
  • When using a mobile banking app, make sure you connect over a secure network rather than a public Wi-Fi hotspot. You can also disable the Wi-Fi and switch to a cellular network. It’s always best to use the mobile banking app sanctioned by your bank.
  • Use strong passwords and PINs; use a different password and PIN for each website.
  • Ensure you have effective and updated antivirus/antispyware software and firewall running before you log in to your bank account.
  • Do not reveal your passwords or PINs to anyone else or write them down.
  • If you notice any unusual transactions in your statement, report them immediately.
  • Cancel paper statements as they are easily intercepted and read. Instead, opt-in for e-statements and/or register for mobile alerts.

 

Leave a comment

Filed under Articles

5 ways hackers attack you (and how to counter them)

tumblr_mbw0rjljJJ1rzdozgo1_400

I saw this article on Fox News this weekend and thought it very interesting and rather scary actually. The thing that amazed me most was that for $3,000 you are able to buy a fully operational kit to start your hacking career. unbelievable, well not really I suppose, nothing should surprise us these days.

1. Phishing scams
Received an email from the Queen of Nigeria or some official sounding lawyer offering you a million dollars to be transferred into your account once you send your details? I don’t think so. You are probably thinking who would fall for that. Well believe it thousands a year get sucked in.

2. Trojan horse
One of the most popular ways to deliver a Trojan is a variation of the phishing email scams.

An example of this(and I get one at least twice a week) is an email from a well-known shipping company saying you have a delivery (mine always seem to be DHL at the moment). Just click on the URL address and they have slipped their slimy little hands into your computer.
An alarm bell should go off if the company does not address the content of the email with your name. For example if they use Dear customer, or Dear resident. “DO NOT OPEN”. I often get one from the bank saying my ATM card is blocked. I rang the company the first time it happen just to make sure then forwarded it to their fraud department.
Similar scams appear on Facebook and Twitter. You think you’re going to watch a funny video your friend posted. Instead, a pop-up tells you to update your video player. The “update” file it provides is really a Trojan.

3. Drive-by downloads
Hackers set up websites with a virus attached. It can be found on popular search engines and look very genuine.
Hackers can also sneak on to anyones website after finding some security weakness on your site and embed their virus in your website. This then requires a very good security to detect this. You may need to contact the security software company for them to run through your site. Often you can be alerted by a person whose own website security has picked it up.
You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.
All my computers are ‘Apple’ and although I do not have the same problems as a PC owner we apple owners are not impenetrable so we need to be careful.

4. Bypassing passwords
Hackers don’t waste time trying to guess your password these days.
They might get your password from a data breach at a company or website you use. That happens often as you hear on the news.
You need to change your password every now and then and also the security questions.
Give an answer to the security question that has nothing to do with the questions.
That would be confusing for them.

5. Using open Wi-fi
Just don’t do it.
Hackers or neighbors can hack your computer from outside your building or at Starbucks or wherever you are sitting innocently working on your computer.
I think most people know this now but just in case check your security system to make sure.

This is a very good article and worth reading in full
Another good site

1 Comment

Filed under Articles

What’s Up On This Day – 1/16/2012

Another good Cell Phone Deal
Republic Wireless have a cell phone plan of $19 a month. This plan is unlimited everything.
Unlimited calling, unlimited email, texting and data for $19.00
I would call that a good deal.

1. Must use LG Optimus S. They say that more phones will be available later on.

2. There is a membership fee of $199

3. Automatically connects to WiFi when available otherwise it uses cellular network that is available to them.

To find out more go to Republicwireless.com

Zappos Hackers

Apparently via the news on HLN this morning Zappos have been hacked.
If you have ordered something from Zappos online you may have had your information hacked.
They may have:-

  • Your Name.
  • Where you live
  • Phone number
  • email address
  • Account password
  • Last four digits of your credit card

If you do have an account with Zappos your password will no longer be valid so suggest you go online to Zappos and change your password. If you use that same password for other accounts it may be advisable to change them as well.

Leave a comment

Filed under Articles