CCIU Cybercrime Prevention Flyers

Cyber Crime Prevention Flyers provide recommendations to strengthen your cyber security posture and prevent computer crime before it occurs.

Cyber Sextortion - Stay safe looking for love online

Protect Your Personal Email Account - Your email could be compromised

IRS Phone Scams - Avoid tax telephone scams

Motor Vehicle Exploits - Auto hacking, it's not a myth

Online Misconduct: Awareness and Reporting - Improper behavior online

Don't scan your CAC! - DO NOT download or use any application designed to read your CAC.

Extortion scams - Data breaches and your personally identifiable information

USAJOBS warning - USAJOBS warns users of email phishing scam

Home Computer Security Tips - Safe computing practices for the home

Social Networking Safety Tips - Configuring Facebook, Twitter, LinkedIn, and Google+ for a more secure social networking experience

Twitter Safety Tips - Configuring Twitter for a more secure social networking experience

LinkedIn Safety Tips Configuring LinkedIn for a more secure social networking experience

Google+ Safety Tips - Configuring Google+ for a more secure social networking experience

Facebook Safety Tips - Configuring Facebook for a more secure social networking experience

Apple Mobile Device Ransom Scam - Apple Mobile Device Ransom Scam

Cybercriminals Target USAA Members - Fake customer incentives

Held for Ransom Part II - Ransomware

CCIU Cybercrime Prevention Flyers Archive

Cyber Sexual Extortion ("Sextortion") - Cyber Sexual Extortion ("Sextortion")

Unsolicited Software or Devices - Cybersecurity and legal concerns with unsolicited software/Devices

I Don't Want to Plug and Play - Universal Plug and Play vulnerabilities

Remote Hostile Takeover - Smartphone security

Mobile Device Malware - Avoiding mobile device malware

Home Computer Security - Safe computing practices

MyPay or No Pay Apps - Third party DFAS apps

The Not So Thrifty Apps - Unauthorized Thrift Savings Plan (TSP) mobile applications

Held for Ransom - Ransomware

Phoney Tech Support - Social engineering attacks based on computer tech support

Personal Computer Doomsday? - DNSChanger malware

E-mails About Bin Laden Might Pack A Malicious Punch - E-mails about Usama bin Laden’s death used to spread malware

Energizer® Battery Charger Software Could Leave Your PC Drained - Backdoor in Energizer® DUO USB battery charger software

Pop-Up Could Leave Your PC Messed Up - Pop-up window malware/ransomware

P2P Might Leave You in a Tree - Data leakage from improperly-configured Peer-to-Peer applications

Stimulus Program May Leave You Less Than Stimulated - Economic stimulus phishing scam

USAJOBS.GOV Data Compromised - Hackers stole user IDs, passwords, email addresses, names, phone numbers and some basic demographic data

IRS Rebate Check Could Leave You Broke - IRS phishing scam

Valentine Message Could Leave You With A Broken Heart (Or Hard Drive) - Social engineering to obtain personal information by tricking them into installing malicious software (malware)

“MONSTER PHISH” Lure Online Job Seekers - Hackers stole names, e-mail addresses, and telephone numbers of about 146,000 subscribers to USAJOBS.gov

Virtual Pickpocketing - Credit card that uses RFID technology can transmit your personal information

Turning Tragedy Into Cyber Crime - Fraudulent schemes to capitalize on the Virginia Tech shootings

OPSEC On The Cyber Home Front - A risk management approach to how much or how little personal information to make available on the Internet

Wireless (IN)Security: Who's Snooping On Your Home Network? - Wireless hackers who snoop on your activities, steal your data, and surf on your network

Cyberbullying: Virtual Taunts, Real Harm - Wireless hackers who snoop on your activities, steal your data, and surf on your network

“VISHING” Is The New “PHISHING” - Cyberbullying consists of sending or posting harmful material using the Internet or other digital technologies

Thrift Savings Plan Security Notice - Several TSP participants were infected with keylogging software