MCU Cybercrime Prevention Flyers

Cyber Crime Prevention Flyers provide recommendations to strengthen your cyber security posture and prevent computer crime before it occurs.

Online Misconduct: Awareness and Reporting - Understanding the improper use of technology

Cyber Terminology 101 - Are you familiar with common cyber terms?

QR Code Fraud - Be careful of what you scan

Ransomware - A virtual hostage situation

Government Impersonator Scams - What to do when a "government official" calls and wants your personal information

Protecting Children Online - How to protect your children as they navigate the Internet

Employment Scams - Learn how to identify employment scams

Phishing Scams and Email Spoofing - Email phishing and spoofing caused more than $350 million in victim losses in 2019

Housing Rental Scams - Scammers advertise rentals that do not exist, are no longer available, or are up for sale

Blackmail Scam Resurfaces - Scammers are threatening victims with alleged webcam video footage

Video Conferencing Safety - Cybercriminals can exploit video-teleconferencing

COVID-19 Scams - Beware of fake and fraudulent COVID-19 sites

Romance Scams - Learn what to look for

Corona Virus, Cybercriminals and You - Don't fall victim to scammers during the COVID-19 outbreak

Child Identity Theft - How did my 6-year-old get a credit card?

Social Media Scamming - What’s New? - Card popping, cash out, card flipping and cracking

Telephone Fraud and Scams - Don't fall for telephone scams

Blackmail Emails - How to deal with blackmail email messages

Typosquatting - Be aware of slight variations in website addresses

Internet of Things - How these things can be compromised

Webcam Blackmail - A quick and abusive online attack you can avoid

Virtual Kidnapping Fraud - To avoid becoming a victim, look for these indicators

Do You Know Where Your Personal Fitness Device Is? - Fitness trackers are broadcasting your location

Combating Social Media Impersonation - Are online scammers using your information to perpetrate a crime?

Wireless Network Security - Is your wireless network secure?

Online Scams - Soldiers are being targeted by cyber criminals intent on extorting money from them

Nonconsensual Pornography - Distribution of sexually explicit images may violate existing Federal laws or the Uniform Code of Military Justice

Cyber Sextortion - Stay safe looking for love online

Protect Your Personal Email Account - Your email could be compromised

Social Networking Safety Tips - Configuring Facebook, Twitter, LinkedIn, and Google+ for a more secure social networking experience

Twitter Safety Tips - Configuring Twitter for a more secure social networking experience

LinkedIn Safety Tips Configuring LinkedIn for a more secure social networking experience

Facebook Safety Tips - Configuring Facebook for a more secure social networking experience

MCU Cybercrime Prevention Flyers Archive

**These archived documents may contain broken links**

Apple Mobile Device Ransom Scam - Apple Mobile Device Ransom Scam

Cybercriminals Target USAA Members - Fake customer incentives

Held for Ransom Part II - Ransomware

Google+ Safety Tips - Configuring Google+ for a more secure social networking experience

IRS Phone Scams - Avoid tax telephone scams

Motor Vehicle Exploits - Auto hacking, it's not a myth

Don't scan your CAC! - DO NOT download or use any application designed to read your CAC

Extortion scams - Data breaches and your personally identifiable information

USAJOBS warning - USAJOBS warns users of email phishing scam

Home Computer Security Tips - Safe computing practices for the home

Cyber Sexual Extortion ("Sextortion") - Cyber Sexual Extortion ("Sextortion")

Unsolicited Software or Devices - Cybersecurity and legal concerns with unsolicited software/Devices

I Don't Want to Plug and Play - Universal Plug and Play vulnerabilities

Remote Hostile Takeover - Smartphone security

Mobile Device Malware - Avoiding mobile device malware

Home Computer Security - Safe computing practices

MyPay or No Pay Apps - Third party DFAS apps

The Not So Thrifty Apps - Unauthorized Thrift Savings Plan (TSP) mobile applications

Held for Ransom - Ransomware

Phoney Tech Support - Social engineering attacks based on computer tech support

Personal Computer Doomsday? - DNSChanger malware

E-mails About Bin Laden Might Pack A Malicious Punch - E-mails about Usama bin Laden’s death used to spread malware

Energizer® Battery Charger Software Could Leave Your PC Drained - Backdoor in Energizer® DUO USB battery charger software

Pop-Up Could Leave Your PC Messed Up - Pop-up window malware/ransomware

P2P Might Leave You in a Tree - Data leakage from improperly-configured Peer-to-Peer applications

Stimulus Program May Leave You Less Than Stimulated - Economic stimulus phishing scam

USAJOBS.GOV Data Compromised - Hackers stole user IDs, passwords, email addresses, names, phone numbers and some basic demographic data

IRS Rebate Check Could Leave You Broke - IRS phishing scam

Valentine Message Could Leave You With A Broken Heart (Or Hard Drive) - Social engineering to obtain personal information by tricking them into installing malicious software (malware)

“MONSTER PHISH” Lure Online Job Seekers - Hackers stole names, e-mail addresses, and telephone numbers of about 146,000 subscribers to

Virtual Pickpocketing - Credit card that uses RFID technology can transmit your personal information

Turning Tragedy Into Cyber Crime - Fraudulent schemes to capitalize on the Virginia Tech shootings

OPSEC On The Cyber Home Front - A risk management approach to how much or how little personal information to make available on the Internet

Wireless (IN)Security: Who's Snooping On Your Home Network? - Wireless hackers who snoop on your activities, steal your data, and surf on your network

Cyberbullying: Virtual Taunts, Real Harm - Wireless hackers who snoop on your activities, steal your data, and surf on your network

“VISHING” Is The New “PHISHING” - Cyberbullying consists of sending or posting harmful material using the Internet or other digital technologies

Thrift Savings Plan Security Notice - Several TSP participants were infected with keylogging software