Identification

SunTrust Spoof: Additional ways of protecting your SunTrust access

Member for

8 months 3 weeks
Submitted by AlReaud on Tue, 09/27/2011 - 19:50

Updated: 11/6/2016

This is a recent phish wherein you get the following email (allegedly) from SunTrust Bank:

Subject: Additional ways of protecting your SunTrust access
From: "Suntrust"<infor@suntrust.com>



SunTrust Online Banking Alert:

Banking with SunTrust Online is about to become even more secure!
As a valued SunTrust online customer, the security of your identity and personal account information is extremely important. We are installing Enhanced Online Security as an additional

How to prevent yourself from getting phished...

Member for

8 months 3 weeks
Submitted by AlReaud on Mon, 05/30/2011 - 17:50

So you get this email, what's the key in not getting hacked?

YouTube help center | e-mail options | report spam

YouTube Service has sent you a message:

You can reply to this message by visiting your inbox.

© 2011 YouTube, LLC
901 Cherry Ave, San Bruno, CA 94066

The key is to pay attention to the links in the status bar. Every link in the above is bogus. But if you watch the status bar in your browser, you won't ever get bit. If your status bar is not turned on, make sure to turn it on. Clicking on bogus links is the easiest way to get phished, and also the easiest scam to prevent!

Anonymity on the Internet

Member for

8 months 3 weeks
Submitted by AlReaud on Mon, 05/30/2011 - 17:36

Note: Updated 10/29/2016

Anonymity on the Internet is a desirable goal for many regardless of the reasons behind it. However, that is not actually possible on certain platforms without significant effort. In this article, we will show applications that facilitate such on different platforms. Please realize ahead of time that the Windows platform is significantly weaker than Linux/Unix and OS X in such capability, and that total anonymity from a computer behind a home gateway may not be possible. Only through use of random access points in conjunction with an open source anonymizer can one be secure.

Tor

Tor stands for Tor Onion Router, and is developed as the open source Tor Project.  Onion routing is a concept whereby a given router in the chain of connections between origin and destination only knows the previous and next link in a connection's link chain, but doesn't know the ultimate origin or destination of a connection. Interestingly, it's origin and creation comes from the US Naval Research Laboratory. It does have significant weaknesses, however, for the