10 Dumbest Things to Do Online

Trying to get scammed? Engage in these stupid but common online practices and the smart money is that you likely will. 1. Falling for emotional bait. Online and otherwise, scammers line their pockets on your emotions — greed, fear, curiosity — and often fuel each with “Act Now!” urgency. Offers of easy money and threats of negative consequences phish for your money and/or personal information. Promises of forbidden photos or links, especially with terse “Check this out!” messages, are used to install …

Half of U.S. Adults Hacked: Are You Among Them?

In the past 12 months your personal information has likely been stolen, leaving you vulnerable to identity theft. About 432 million online accounts belonging to 110 million Americans - roughly half of all adults - were hacked in cyberattacks during the past year, according to new findings by the Ponemon Institute, a data-collection research firm. Meanwhile, Consumer Reports estimates that some 11 million Americans fell victim to email scams in 2013. And in the first four months of this year, at least 260 …

Cyber Scam Predictions for 2014

As the year closes, leading online security vendors are looking into their crystal balls – or rather, reviewing recent trends of trickery – to predict the top cyber scams of 2014. Some notables worth a mention: TVs watching you. Many traditionally “dumb” devices are getting “smarter” – televisions, gaming systems and even baby monitors are being connected to the Internet and often contain cameras or microphones. So, many cybercops predict them to be a magnet for attack, such as remote spying. …

Adobe Announces Customer Data Breach

Software manufacturer Adobe says that hackers infiltrated its computer system, gaining access to sensitive information on nearly 3 million customers – including names, encrypted credit and debit card numbers and details of past orders. “At this time, we do not believe the attackers removed decrypted credit or debit card numbers from our systems,” Adobe said in a statement. Hackers also illegally took copies of the source code of some of the company’s widely used products, which, according to online security …