Newsroom

minusminustext size

Banking Trojan "Dridex" and Microsoft Office Macros

Posted: Tuesday, January 13, 2015

Threat intelligence sources including the FS-ISAC and Microsoft are reporting a resurgence of "banking Trojans" - malware that specifically targets online banking services, bank customers, and their accounts. The malware is being spread through macros contained in Microsoft Office documents (e.g. Word, Excel, etc.). Read more

Safe and Dangerous Email File Extensions

Posted: Tuesday, January 13, 2015

Email attachments are a part of the regular and necessary business communication we have within our financial institution and with customers, vendors and other parties outside of it. With attackers crafting and changing malicious software (viruses, Trojans, worms, macros, etc.) often daily, even the best antivirus software can't catch all of the dangerous attachments. Read more

Is Your Smartphone or Tablet Protecting Your Personal Information!

Posted: Monday, January 05, 2015

Is your device sharing your personal information? Take the Mobile Device Personal Risk Assessment to see if you are at risk. Read more

Holiday Online Security Tips

Posted: Monday, December 01, 2014

With the start of the holiday season commencing, the last thing most folks want to spend their time doing is recovering from the consequences of debit or credit cards stolen from online purchases. We're sharing these valuable tips from the U.S. Department of Homeland Security in order to help our customers have a financially safe and enjoyable holiday season. Read more

Apple IOS Device (iPhone & iPad) App Masque Attack

Posted: Sunday, November 30, 2014

Security firm FireEye is advising of a new threat to Apple mobile device users due to a flaw that permits malicious apps to replace genuine IOS apps when downloaded from sites outside the Apple Store. Read more

Critical Infrastructure and Its Threats: Protecting the Heartland

Posted: Tuesday, October 28, 2014

In this last week's National Cyber Security Awareness Month bulletin, we're pleased to share a briefing with you that brings together a foundation of best practices that will help you going forward in securing your personal and mobile computing devices. Our final topic explores the concept of critical infrastructure and relates your role in its operation and protection. Read more

Mobile Commerce: New Technologies & Your Identity

Posted: Monday, October 20, 2014

With smartphones and tablets becoming a dominant technology for American consumer's communications, mobile commerce has naturally followed in the effort to extend even greater access and convenience to commerce and financial services. Read more

Spear Phishing...When Hackers Call You By Name

Posted: Monday, October 13, 2014

Lots of us have heard of the cybersecurity term "phishing", which refers to the attempt by malicious folks to take over our personal and work computers by tricking us into clicking on a malicious web address link. But what is spear phishing and why is it even more dangerous? Read more

Modems, Microwaves & Thermostats, Oh My!

Posted: Monday, October 06, 2014

Last year, 378 million adults were the victims of cybercrime. Follow our bank website this month for important weekly tips on how you can help protect yourself from identity theft, financial loss and other cyber risks. Read more

Questions About Home Depot Data Breach?

Posted: Monday, September 15, 2014

Customers who made purchases with debit or credit cards at U.S. and Canadian stores may face the potential for fraud. Read more

« 1 2 »