- Phishing Campaign Linked with “Dyre” Banking Malware
- Crypto Ransomware
- SSL 3.0 Protocol Vulnerability and POODLE Attack
- GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)
- Just because your company's spam filter, virus filter and other defenses let an email through, doesn't mean it's harmless
- Hackers aren't the only threat to your computer
- Use Google's cached mode to avoid spyware
- Be skeptical and trust your instincts
Red Flags Rule (under Fair and Accurate Credit Transaction Act)
The Red Flags Rule is a component of the Fair and Accurate Credit Transaction Act, which set a requirement that all businesses and organizations must develop and maintain an identity theft prevention program. The purpose of the program is to assist in the detection of potential identity theft indicators, or red flags.
For more information, please visit the Federal Trade Commission’s page on the Red Flags Rule.
For tips on preventing identity theft, please visit the Student Service Center page on Identity Theft Prevention Tips.