Welcome to the Dashlane Tech Check for January 6, 2017! I’ll help you catch up on all Dashlane-related news and the latest buzz about password managers, digital security, identity, and more! At the end of each weekly post, I’ll also include a useful life hack that will keep you safe and secure all year long. With that said,
We all want to find the sweetest deal on best name-brand clothes, sleek new toys, and the hottest tech gadgets on the market. But do you really know if that online shopping website is just selling you a bag of coal? According to Forbes, retailers are projecting that online fraud attempts will increase 43 percent this year alone, and is projecting to peak on Christmas Eve–accounting for 2.5 percent of all fraud for the year.
Online shopping fraud continues to increase not only because scammers continue to improve the look and feel of their fake websites, but they’re also using legitimate methods to reach new potential victims, including email, text messages, and Facebook advertising. Luckily, there are a few telltale signs you can look for while online shopping to distinguish authentic e-commerce sites from the fake. Before entering any personal or payment information into an online shopping site, ask yourself these important questions:Continue Reading →
Daylight Saving Time ends on November 6, and we’ll all turn back our clocks an hour–or let our smartphones do it for us.
Daylight Savings serves a great reminder to make small beneficial changes that will give you peace of mind all year long. We’ve put together this quick list and graphic with the five things you should check and change along with your clocks as we fall back to Standard Time.
A cyber security researcher on a jet hacks into flight controls via its in-flight information system.
A practical joker cracks the code for programming electronic highway road signs.
An organized crime group hides drugs in an ocean shipper’s legitimate cargo and uses hackers to gain data needed to steal the cargo containers in port.
A cybercriminal gains access to a railroad’s signaling system by pretending to be a rail company executive and sending out bogus emails to other employees.
Each of these scenarios demonstrates what happens when a cybersecurity vulnerability common in transportation and other critical infrastructure systems is discovered and abused: a weak password. The first three actually occurred; the fourth is a terrifying possibility.
It’s that special time of year where ghouls and goblins roam the streets, hidden creatures go bump in the night, and ghastly cyber criminals sneak upon you when you least expect it.
If you’re looking for something to truly scare your socks off, check out these terrifying cyber threats that will send a tingling chill down your spine. 👻Continue Reading →