COVID-19 Fraud & Security Alerts
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Holiday Cyber Safety Tips 2020
Holiday Cyber Safety With so many people choosing to shop online this holiday season, you need to be extra vigilant about avoiding cyber scams that can not only steal your money, but also corrupt your home and/or work computer and network. E-commerce sales are expected to rise by 25 to 35 percent as shoppers choose using their computers and smartphones over brick and mortar stores. Cyber criminals may target victims through a variety of methods, including compromised or spoofed websites, phishing emails, social media ads and messages, or unsecured Wi-Fi networks. The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has put out a number of tips to help increase awareness of these cyber threats and help you avoid these cyber traps at home and work. 1. Do Your Online Shopping at Home and avoid using work computers - Avoid using public computers, such as those at a library or hotel, or public Wi-Fi connections to log in to personal accounts or conduct online shopping. Public computers could be infected with malware designed to steal your information and hackers can intercept network traffic traveling over unencrypted Wi-Fi signals. TIP: If you must connect to public Wi-Fi, use a virtual private network (VPN) to secure information transmitted between your device and the internet. Refrain from using work computers to make online purchases as cyber threats could endanger company and/or customer information. 2. Look Out for Holiday-Themed eCards and Messages Meant to Install Malware - In the past, users reported being targeted with various Thanksgiving Day-related scams. -
Cybersecurity Cyberwise Tips
May 11, 2021 | CyberWise – How to Create a Strong Password Recently, the State Department’s Directorate of Cyber and Technology Security released their guidance on creating strong passwords. Considering that most Federal and contract employees continue to work remotely, continued reliance on strong passwords for both business and personal accounts is very important. The most used passwords are extremely easy to guess and only take hackers a few seconds to crack. For example, “Admin1234” would only take 0.22 seconds to crack. By contrast, a memorable phrase such as “WherecanIfindagoodsandwich?” would take 771 years to crack with current brute force methods. How to stay CyberWise, according to the State Department: • When possible, use your PIV or multi-factor authentication. • Use different passwords for different accounts. If you are reusing a password on multiple accounts and a hacker cracks one of them, they may try the recovered passwords on your other accounts too. • Do not include personal identifiers like your phone number, name, child or pet’s name, or birth date, especially for those who were affected by the OPM breach in 2015 – this information is already on the Dark web. • Avoid selecting commonly used words (e.g., colors, fruits, animals, days) or phrases (e.g., “Password1234,” “DOSadmin1”). Password cracking tools include dictionary-based testing capabilities. • Do not use repetitive characters or patterns (e.g., “0000,” “1234,” “aaa,” or “7878”). • Consider using a unique passphrase that is easy to remember or picture in your mind, but difficult to guess. According to the National Institute for Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. -
CRIMINAL JUSTICE in AMERICA FIFTH EDITION Cja Unit1a:Layout 1 7/10/2012 2:10 PM Page 1
CRIMINAL JUSTICE IN AMERICA FIFTH EDITION cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 1 CRIMINAL JUSTICE IN AMERICA FIFTH EDITION Developed by Marshall Croddy Bill Hayes cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 2 601 South Kingsley Drive T. Warren Jackson, Chair Los Angeles, California 90005 Marshall P. Horowitz, Chair, (213) 487- 5590 Publications Committee www.crf-usa.org Jonathan Estrin, President Marshall Croddy, Vice President Developed by Subject Matter Consultants Marshall Croddy and Bill Hayes (Various Editions) Richard Chrystie, Deputy District Attorney, Board Reviewers Los Angeles County Marshall P. Horowitz, Lisa Rockwell, Val Cole, Deputy District Attorney, Patrick Rogan, K. Eugene Shutler, Los Angeles County Douglas Thompson, Lois Thompson Star French, Deputy Probation Officer, Editor Los Angeles County Bill Hayes John Hud, Criminal Defense Attorney, Bozeman, Montana Contributing Writers (Various Editions) Daniel E. Lewis, Attorney, Los Angeles Bill Hayes, Marshall Croddy, Todd Clark, Julia Rider, Luce, Forward, Hill, Jeffer & Teri Engler, Lucy Eisenberg, Damon Huss, Mangels Sandy Kanengiser, Carlton Martz, Betsy Devallis Rutledge, Special Counsel to the Salzman, Eden Kusmiersky, Coral Suter, District Attorney, Los Angeles County Charles Tremper, Michelle Ng, Roy Kim, Richard Simonian, Superintendent, C.K. Shruti Modi, Anjelica Sarmiento, Sophia Khan, Wakefield School, Fresno County Probation Marianna Muratova Department Researchers Captain Robert Taylor, Commanding Officer, (Various Editions) Juvenile Division, Los Angeles Police Rick Bhasin, Luke Delgado, and Michael Sokolson Department Kerry White, Head Deputy District Attorney, Production Juvenile Division, Los Angeles County Andrew Costly, Designer Library of Congress Cataloging-in-Publication Data Criminal justice in America / developed by Marshall Croddy and Bill Hayes ; edited by Bill Hayes ; written by Bill Hayes .. -
Payment Apps and Car Infotainment Systems (02/25/21) Payments Apps Like Venmo, Cash App, and Zelle Offer Convenient Ways to Send and Receive Money
Payment Apps and Car Infotainment Systems (02/25/21) Payments apps like Venmo, Cash App, and Zelle offer convenient ways to send and receive money. According to a recent study, about 80% of U.S. adults use mobile payment apps. Unfortunately, many people assume that payment apps offer protections similar to those of credit or debit cards, but that’s not the case. Generally, transactions cannot be reversed if there’s a problem or if you change your mind, even if your account is linked to a credit card. In addition, some financial institutions are activating Zelle without customers’ knowledge, which could be an issue if your banking credentials are compromised and criminal gets access to your account. If you decide to use a payment app, consider setting up a separate bank account for that purpose, and only put in money needed to fund those transactions. If you don’t, and have linked your savings account to your checking or payment account, the scammer may get access to those funds as well, through automatic overdraft protection, or compromised credentials. It is generally recommended that you never use these apps to send money to strangers – only use them with family, friends, or trusted sources. Many newer cars on the road today offer a great deal of technology and connectivity. People often forget that these cars are really computers on wheels and present a variety security and privacy concerns. Today’s technology allows you to connect your smartphone to your vehicle to have easy access to your contacts, messages, photos, navigation services, and internet connection.