Added by Enrique Suarez on November 30, 2015 at 7:19pm — No Comments
Added by Enrique Suarez on November 29, 2015 at 2:56pm — No Comments
(Contributed by Ajay Kumar Jhingan, Trainer – Banking & Finance)
Ajay Kumar Jhingan, our member and International Speaker/Trainer in Corporate and Retail Banking, is preparing his new course in Global Risk Academy -…Continue
Added by Boris Agranovich on November 29, 2015 at 9:30am — No Comments
Added by Enrique Suarez on November 28, 2015 at 11:57pm — No Comments
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently you post on your Facebook page—even if you don’t have a Facebook account—your life can be hacked into as long as you own just one password—and the ability to be…Continue
Added by Robert Siciliano on November 28, 2015 at 3:07pm — No Comments
Learn the fundamental skills on how to become a successful Risk Management professional.
What Will You Learn in This Course
Added by Boris Agranovich on November 26, 2015 at 8:30pm — No Comments
Added by Enrique Suarez on November 26, 2015 at 6:35pm — No Comments
A phishing e-mail is sent by a cyberthief to trick its recipient into revealing sensitive information so that the crook could steal money from the recipient or gain access to a business’s classified information. One way to lure an employee is for the crook to make the e-mail appear like it was sent by the company’s CEO. Often, phishing e-mails have urgent subject lines like “Your Chase Bank Balance Is Negative.”
In its 2015 Data Breach Report, Verizon reported that…Continue
Added by Robert Siciliano on November 26, 2015 at 3:18pm — No Comments
The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a bicyclist is obviously fake. Isn’t it?
But what about the video of the man cut in half by a bus while riding a bicycle, lying on the ground, staring at his intestines, talking for a full five minutes, while…Continue
Added by Robert Siciliano on November 25, 2015 at 3:20pm — No Comments
With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber scammers waiting for their prey.
How can you avoid these predators?
Added by Robert Siciliano on November 24, 2015 at 3:21pm — No Comments
This application for your mobile device will change things in a huge way:
And why should you consider the world’s first biometric password for your mobile device? Because most smartphone security devices have been cracked by cyber thieves.
Layers of protecting your online…Continue
Added by Robert Siciliano on November 23, 2015 at 3:12pm — No Comments
Added by Enrique Suarez on November 23, 2015 at 2:03am — No Comments
Added by Enrique Suarez on November 23, 2015 at 1:54am — No Comments
Added by Enrique Suarez on November 22, 2015 at 8:37pm — No Comments
Hang Onto Your Wallets: Negative Interest Rates, the War on Cash, and the $10 Trillion Bail-in…Continue
Added by Enrique Suarez on November 22, 2015 at 3:00am — No Comments
A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system.
This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security.
But whom better to ask than a burglar, right? Same with a company’s computer systems: The best expert may be the black hat or better, white hat hacker.
An article at bits.blogs.nytimes.com says that Facebook, Google, Microsoft,…Continue
Added by Robert Siciliano on November 20, 2015 at 3:22pm — No Comments
There should be more TV commercials for preventing identity theft—it’s nearly epidemic. But also epidemic is the lack of identity security that people have when traveling. Here are some ways to avoid having your identity stolen while traveling:
Added by Robert Siciliano on November 20, 2015 at 3:21pm — No Comments
Enrique Suarez Presenting:
Added by Enrique Suarez on November 20, 2015 at 4:00am — No Comments
Added by Enrique Suarez on November 19, 2015 at 8:40pm — No Comments
After receiving medical treatment, many people never look over the paperwork (save for bill total) and just shove it into some folder in a file cabinet. But medical identity theft is very much out there; know the signs:
Added by Robert Siciliano on November 19, 2015 at 3:31pm — No Comments