Posts

Facebook Privacy and safety

Image
  What is Facebook Privacy and safety: Facebook offers privacy controls in order to allow users to choose who can view their posts: only friends, friends and friends of friends, everyone, custom (specific choice of which friends can see posts). While these options exist, there are still methods by which otherwise unauthorized third parties can view a post. Privacy and security are related. Privacy relates to any rights you have to control your personal information and how it's used. Security, on the other hand, refers to how your personal information is protected. Staying safe: Sharing Every day, people around the world share things on Facebook that result in new and incredible ideas, opportunities, friendships and collaborations. We ask people to consider their audience when sharing on Facebook. It's important to be thoughtful about how and what you share. We make it easy for everyone to decide who can see the content they share, and we have policies that prohibit hateful, vio...

CRYPTOCURRENCY

Image
  What is cryptocurrency?  Cryptocurrency is essentially digital money. However, unlike regular fiat currency (such as Dollars, Pounds, Yen, etc.), it decentralized, meaning it isn’t backed or regulated by a central authority, such as a bank, government, or country. There are other differences between crypto assets and other kinds of money. For a start, cryptocurrencies don’t exist in a physical format – there are no coins or bills that you can use; they are all digital. Similarly, they’re not based on another asset such as gold, and it’s not stored in a bank or financial institution.  So, cryptocurrencies are digital, decentralized currencies that are based on blockchain technology. Although cryptocurrencies such as Bitcoin and Ethereum are some of the most well-known, there are actually more than 4,000 in existence.  How do cryptocurrencies work?  We already know how blockchain technology works. Blocks of data in the chain are created with unique identifi...

Social Engineering: Types & Prevention Techniques

Image
  Social Engineering, unlike common hacking methods such as brute-forcing, cross-site scripting, or keylogging, instead uses a variety of psychological, informational, and behavioural techniques in order to access an organization’s information by exploiting a company’s weakest link - its employees. It’s also the underlying technique used to implement some of the most common methods of attack such as phishing and ransomware. Verizon’s 2020  Data Breach Investigations Report  ranked Social Engineering attacks as the 2nd highest cause of data breaches. These attacks have been rising over the years due to the relative ease of execution and lack of technical knowledge needed. The top most common Social Engineering attacks: 1. Pretexting The practice of impersonating or fabricating an identity in order to obtain sensitive information from a target. Pretexting works by building a false sense of trust with a target so that they can gain access to company information down the...

Credit Card Payment Fraud & How to Avoid Theft

Image
Security and compliance often appear to go hand-in-hand these days. Problematically, many companies start with compliance then reverse-engineer security in a nearly futile attempt to protect data. In the payment card industry, the Payment Card Industry Security Standards Council (PCI SSC) established PCI Data Security Standard (PCI DSS) which sets the “gold standard” for compliance. Meanwhile, despite meeting the compliance standard, cardholder data (CD) remains a  primary target for cybercriminals . By understanding the seedy underbelly known as the Dark Web and the way Cybercrime-as-a-Service (CaaS) works, merchants and payment card processors can better secure CD from fraud and theft. What is payment card fraud and why is card information so valuable? Payment card fraud, also known as credit card fraud, is defined as the unauthorized use of a credit card, debit card, or similar payment tool. Cybercriminals often fraudulently utilize payment data to steal money or property from t...

Spam and Phishing

Image
  Malicious Email A malicious email can look just like it comes from a financial institution, an e-commerce site, a government agency or any other service or business. It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or there is another urgent matter to address. If you are unsure whether an email request is legitimate, try to verify it with these steps: Contact the company directly – using information provided on an account statement  on the company’s official website or on the back of a credit card. Search for the company online – but not with information provided in the email. Spam Spam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email. Here are ways to reduce spam: Enable filters on your email programs:  Most internet service providers (ISPs) and email providers offer spam filters; however, depending on the level you set, you may end up blocking emails...