Understanding and Protecting Yourself Against Money Mule Schemes

Overview

“Money mules” are people who are used to transport and launder stolen money or some kind of merchandise. Criminals may even recruit money mules to use stolen credit card information. People who are used as money mules may be willing participants; however, many money mules are not aware that they are being used to commit fraud.

The people used as money mules are not the only victims; the larger scheme is designed to extract money from an organization or from other people. The most common money mule solicitations are disguised as “work from home” opportunities.

The Risks of Using Portable Devices

Overview

Portable devices such as jump drives, personal audio players, and tablets give users convenient access to business and personal data on the go. As their use increases, however, so do the associated risks.

Using portable devices can increase the risk of data loss (when a physical device is lost), data exposure (when sensitive data is exposed to the public or a third party without consent), and increased exposure to network-based attacks to and from any system the device is connected to (both directly and via networks over the internet).

South Korean Malware Attack

Overview

Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. This paper outlines the attack's common attributes, gives guidance to U.S. Cricital Infrastructure and Key Resource owners and operators, and lists defensive measures against the DarkSeoul malware.

Protecting Aggregated Data

Overview

In their ongoing quest for improved operational efficiency, organizations have come to rely on the ability to collect, access, and process large volumes of electronic data (aggregated data). This reliance has evolved with the development of sophisticated database software and the growing availability of hardware with storage capacity measured in terabytes. By possessing such large volumes of data, however, organizations assume certain risks and responsibilities. Large data stores are valuable informational assets that have become targets for cyber criminals.

Banking Securely Online

Overview

Online banking continues to present challenges to your financial security and personal privacy. Millions of people have had their checking accounts compromised, mainly as a result of online banking. If you are going to use online banking to conduct financial transactions, make yourself aware of the risks and take precautions to minimize them.

Socializing Securely: Using Social Networking Services

Overview

Social networking is a way for people to connect and share information with each other online. Millions of people worldwide regularly access these types of services from mobile devices, applications, and websites.

When you share information online, you need to understand the potential risks, and you need to be wary of what you share and with whom. Common threats from the use of social networking include viruses, identity theft, third-party applications, and social engineering attacks.

Subscribe to General Internet Security