Browse Category

Risks and Threats

All types of vulnerabilities and threat related topics

Phishing for Your Money: How the Scam Works

Phishing is a known scam to most people, if not all. In a phishing scam, the Internet users are lured with potential monetary or other gains. Moreover, sometimes they are scared with fear of financial losses. For identifying phishing scams many posts have been written.  However, they do not discuss complex multi-party ‘phishing for money scams’, where individuals have lost thousands, corporations have lost millions, and FBI estimates total losses exceeds billions. In this post I explain with illustrations how phishing for your money scam works.

To learn how to identify phishing emails, read our post on `9 ways to identify phishing emails.

Complex Multi-step Process Scammers Use for Phishing for Your Money from Banks Starting with a Simple Phishing Email.
Complex Information Flow in a ‘Phishing for Your Money’ Scam.

Keep Reading

Cybersecurity Tips for Travelers

©  2019 by

Cybersecurity risks during travel are usually higher than while your are at home or at your work. This post provides a number of cybersecurity tips for travelers. If you are traveling  international, you need to be extra careful and prepare accordingly. Three steps you ought to take are: Security measures before, during and after your trip. Also, you must protect the device physically; you must connect to the Internet carefully; and you must have software protection.  First, let us consider what cybersecurity measures you should take before you start your trip.

cybersecurity tips for travelers
Secure your device, protect your data, avoid public WiFi and networks for cybersecurity while you are traveling.

Keep Reading

11 Cybersafety Tips for Online Safety

© 2019 by

Our life is integrated with cyberspace. Cyberspace use becoming as normal as breathing air. But there is a BIG difference between the air we breathe and cyberspace we use. When we breathe foul air, we know from its smell that something is not right. Unfortunately, danger signs in the cyberspace are not as obvious to us as the foul smell of air. Hence, we need to stay alert to avoid safety hazards larking in the cyberspace. Cybersafety rules must be observed to stay safe in the cyberspace, because predators are relentlessly trying to find ways to steal our money and our personally sensitive information. Below are 11 top tips for online safety.

Cybesapce is infested with hazards and to protect from attacts one must follow rules for cybersafety aks online safety.
Alice has strong cybersafety; she is staying guarded against attracts coming from the Internet. She has strong online safety.

Keep Reading

Teen Online-Safety Tips for Cybersafety

©  2019 by

For cybersecurity, teen online-safety rules ought to match with their Internet use profiles. The rules presented below are in addition to 11 tips I have in another post. Keeping an adult in the loop is a very important item in the list of online-safety tips for cybersafety. This not because teens cannot be trusted, but it is for their guidance.  Supervising adults should make it clear  to the teens they are supervising that they are not a gatekeeper, but a mature friend for to help teir development. For examples, some personal information posted online may have longterm implication, but it may not be obvious to a teen.

Cybersafety Rules for Teen Online-Safety
Teen Online-Safety Tips for Cybersafety

Keep Reading

Personal Information and Cybersecurity Q&A

Information security is a primary concern of information technology department of all organizations and entities. Similarly, common people are also now becoming familiar with information security. In this post types of information, especially types of personal information are introduced in a question-and-answer format.

What is personal information?

Any attribute that is associated with you the person and that identifies you is your personal information. For examples, your given name and you family name are personal information.

Many people have my given name. How can it be personal?

Personal does not mean unique. Your given name is just one of the many personal information attributes to identify you. For example, many people have given name Mike and driver’s licenses of all Mikes bear their names, but deriver’s license has more information. When all those information attributes are linked together, each Mike’s identity on the driver’s license will be unique. Moreover, assigned number is unique.

Okay, what if Mike change his name to Tom?

Good question. Personal information can be divided into two categories, static and dynamic. Given name falls into the dynamic category of personal information. So, given name may change dynamically with time and intention.

What is static personal information?

Personal information that cannot change with time fall into the static category of personal information. For example, date of birth, parents, and place of birth, etc.

Is my family or last name static personal information?

Yes and no. The family name or last name is usually inherited. But, when a girl get married her family name may be changed to her husbands family name. Also, if a child is adopted, her/his family name may be changed to the adopted family’s family name. Keep Reading