Monthly Archives: October 2014

How to Protect Yourself From Clickjacking Attacks

They can't be seen, they can't be reasoned with, and they want to jack your clicks. Clickjackers have been around since about 2008 but they are getting a lot more press lately thanks to a new wave of clickjacking attacks perpetrated against Facebook users. What is Clickjacking? It may sound like the latest underground dance…
Read more

How Criminals Trick You Into Installing Malware

Your antivirus scanner just popped up an alert letting you know that your computer has been infected with malware. How did this happen? You've been extra careful about not opening anything that looked suspicious, so how did this virus end up on your system? There are many different avenues of attack that criminals use to…
Read more

Drive By Download

Drive by Download Generally speaking, we as humans want to help our fellow humans out. Unfortunately, this fact is abused by what are known as social engineers. Think of social engineering as people hacking. Social engineers attempt to manipulate people to get things they want, whether it be passwords, personal information, or access to restricted…
Read more

How con artists trick your mind

Washington State investigators presents "How Con Artists Trick Your Mind" None of us likes being scammed, and David Modic is no different. But it’s not the fact that scammers try to trick us into handing over our money that bothers him – it’s the way they can rob people of something far more important: their…
Read more

Confidential Resources and Methods for the Investigator

The Confidential Resource offers sources and methods for Investigators and Researchers. This site contains interesting news articles for private investigators and makes for good reading if you have an interest in learning about investigation tools, techniques, resources and more called "Confidential Resources". Click The Confidential Resource to continue reading. The word research derives from Middle…
Read more