CCIU Cybercrime Prevention Flyers

Cyber Crime Prevention Flyers provide recommendations to strengthen your cyber security posture and prevent computer crime before it occurs.

Do You Know Where Your Personal Fitness Device Is? - Fitness trackers are broadcasting your location

Combating Social Media Impersonation - Are online scammers using your information to perpetrate a crime?

Wireless Network Security - Is your wireless network secure?

Online Scams - Soldiers are being targeted by cyber criminals intent on extorting money from them

Nonconsensual Pornography - Distribution of sexually explicit images may violate existing Federal laws or the Uniform Code of Military Justice

Cyber Sextortion - Stay safe looking for love online

Protect Your Personal Email Account - Your email could be compromised

IRS Phone Scams - Avoid tax telephone scams

Motor Vehicle Exploits - Auto hacking, it's not a myth

Online Misconduct: Awareness and Reporting - Improper behavior online

Don't scan your CAC! - DO NOT download or use any application designed to read your CAC

Extortion scams - Data breaches and your personally identifiable information

USAJOBS warning - USAJOBS warns users of email phishing scam

Home Computer Security Tips - Safe computing practices for the home

Social Networking Safety Tips - Configuring Facebook, Twitter, LinkedIn, and Google+ for a more secure social networking experience

Twitter Safety Tips - Configuring Twitter for a more secure social networking experience

LinkedIn Safety Tips Configuring LinkedIn for a more secure social networking experience

Google+ Safety Tips - Configuring Google+ for a more secure social networking experience

Facebook Safety Tips - Configuring Facebook for a more secure social networking experience

Apple Mobile Device Ransom Scam - Apple Mobile Device Ransom Scam

Cybercriminals Target USAA Members - Fake customer incentives

Held for Ransom Part II - Ransomware

CCIU Cybercrime Prevention Flyers Archive

Cyber Sexual Extortion ("Sextortion") - Cyber Sexual Extortion ("Sextortion")

Unsolicited Software or Devices - Cybersecurity and legal concerns with unsolicited software/Devices

I Don't Want to Plug and Play - Universal Plug and Play vulnerabilities

Remote Hostile Takeover - Smartphone security

Mobile Device Malware - Avoiding mobile device malware

Home Computer Security - Safe computing practices

MyPay or No Pay Apps - Third party DFAS apps

The Not So Thrifty Apps - Unauthorized Thrift Savings Plan (TSP) mobile applications

Held for Ransom - Ransomware

Phoney Tech Support - Social engineering attacks based on computer tech support

Personal Computer Doomsday? - DNSChanger malware

E-mails About Bin Laden Might Pack A Malicious Punch - E-mails about Usama bin Laden’s death used to spread malware

Energizer® Battery Charger Software Could Leave Your PC Drained - Backdoor in Energizer® DUO USB battery charger software

Pop-Up Could Leave Your PC Messed Up - Pop-up window malware/ransomware

P2P Might Leave You in a Tree - Data leakage from improperly-configured Peer-to-Peer applications

Stimulus Program May Leave You Less Than Stimulated - Economic stimulus phishing scam

USAJOBS.GOV Data Compromised - Hackers stole user IDs, passwords, email addresses, names, phone numbers and some basic demographic data

IRS Rebate Check Could Leave You Broke - IRS phishing scam

Valentine Message Could Leave You With A Broken Heart (Or Hard Drive) - Social engineering to obtain personal information by tricking them into installing malicious software (malware)

“MONSTER PHISH” Lure Online Job Seekers - Hackers stole names, e-mail addresses, and telephone numbers of about 146,000 subscribers to

Virtual Pickpocketing - Credit card that uses RFID technology can transmit your personal information

Turning Tragedy Into Cyber Crime - Fraudulent schemes to capitalize on the Virginia Tech shootings

OPSEC On The Cyber Home Front - A risk management approach to how much or how little personal information to make available on the Internet

Wireless (IN)Security: Who's Snooping On Your Home Network? - Wireless hackers who snoop on your activities, steal your data, and surf on your network

Cyberbullying: Virtual Taunts, Real Harm - Wireless hackers who snoop on your activities, steal your data, and surf on your network

“VISHING” Is The New “PHISHING” - Cyberbullying consists of sending or posting harmful material using the Internet or other digital technologies

Thrift Savings Plan Security Notice - Several TSP participants were infected with keylogging software