Monday, 9 September 2013

Hass and Associates: Smartphone apps keeps news at your fingertips


You can use your smartphone to improve your personal financial awareness and to become more financially secure.

There are apps that can help you to manage your budget, keep up with business news, improve your fi-nancial literacy and detect scams.

BACK TO BLACK

You can use this budgeting app to set long-term goals and track your spending habits. Make a habit of adding a transaction right into your hand-held device while you are making your purchase. That way there is less chance you'll forget.

The Back to Black app helps you avoid spending more than you earn. You can set monthly spending limits for specific categories such as food, shelter, clothing and transportation. You will know exactly when you have reached your spending limit for the month. If your spending limit is not reasonable, you can modify the limit. Customize your budget to what you would like.

A pie chart shows your spending pattern. Coloured graphs tell you where your money is going each month. You can break down categories into subcategories. Touch the pie graph to see the breakdown.

What if you lose your phone? Do you lose your private information? Your personal financial details are protected by a four-digit pin code. You can also back up your data easily. With one tap you can email a backup to yourself.

The Back to Black app is available for Apple devices, including iPhone, iPod and iPad, from the iTunes app store. Note this app is not available for Android, BlackBerry or Windows Mobile, but there are dozens of other budgeting apps for tracking expenses.

BLOOMBERG

For business news, consider using the Bloomberg or Bloomberg Radio+ apps. Both are free apps. Glance at the news headlines. Click on a story to read. Listen to a Bloomberg Radio report that is being streamed live while you are navigating to the Internet and browsing other websites on your device. You can download reports and later watch video off-line if you don't have access to Wi-Fi.

Do you follow particular stock prices or market indexes? On the Bloomberg Radio+ app, you can personalize the ticker by adding company symbols. Watch the up-to-date information stream across the bottom of your screen.

With the Bloomberg app, you can create a list of individual stocks that you follow regularly. Then, tap on a specific stock name and you can see news headlines related to that stock. Tap on a headline and read the full story.

You can also read Canadian business and personal finance stories on apps from The Star Phoenix, National Post and Globe investor.

SCAM DETECTOR

The best way to prevent fraud is to recognize a scam when you see it after you've educated yourself on how it works on your Scam Detector app.

Scam Detector is an iPhone app in the App Store. An Android version for smartphones is available on the Google Play Store.

Sorin Mihailovici, an Edmonton-based journalist, was motivated to develop the Scam Detector app when a friend lost his life savings in a Nigerian scam. The app is regularly updated with the newest scams.

CSI GLOSSARY TERMS

If you want to improve your financial vocabulary to be able to read financial news reports, consider installing a free CSI app. Although the Canadian Securities Institute app is designed to promote training courses for financial advisers, the glossary is very useful for you as an investor who wants to learn more about your investments and better understand what your financial adviser is talking about.

The handy glossary tells you what acronyms mean. You can also look up the definitions of many words used in estate and income tax planning.

Terry McBride, a member of Advocis, works with Raymond James Ltd. The views of the author do not necessarily reflect those of RJL. Information is from sources believed reliable but cannot be guaranteed. This is provided for information only.

Securities offered through RJL, a member of the Canadian Investor Protection Fund. Insurance services offered through Raymond James Financial Planning Ltd., not a member of the Canadian Investor Protection Fund.

Related Article:

Tuesday, 16 July 2013

Hass och medarbetare, som är att vinna kriget mot IT-brottslighet?



Först trodde Shawn Ballesty förseningen i sin hyran betalas anländer till hyresvärdens konto var normalt.


Då hyresvärden ringde igen: "Hey mate, din hyra inte var betalt," Ballesty påminner om hans hyresvärd säger, känner han online överföring själv.


"Så jag tänkte, jag ska skicka den igen, bara i fall, då reda ut det med banken."

En gång en betalning gjordes och ett kvitto utfärdas, men pengarna kommer fram inte.

Annons
Commonwealth Bank spåras överföringar och råd både hade kapat och, osynligt till Ballesty, sättas in en tredje part konto med en annan bank. En dator på Ballesty's business - alla montering och precisionsstansning tjänster, på Sydneys norra stränderna - var infekterat, banken förklarade.

En bank trojan - skadlig programvara - hade installerats på den utan hans vetskap. Ballesty var bara en av tusentals människor i Australien och i världen att ha deras business bankkonto skinnas av cyberbrottslingar.

Sådan skadlig programvara distribueras ofta via infekterad e-post eller snabbmeddelande länkar skickas via spam, bilagor, piratkopierad programvara eller besök på infekterade webbplatser.

"Det blev utom kontroll, de avlyssna det medan jag gjorde grejer [online]," Ballesty säger.

Tillsammans med hyran, andra mindre belopp togs: totalt $18.000 stulen i mindre än en vecka.

Australiska banker arbetar tyst för att ta itu med problemet, i synnerhet en trojan kallas Carperb, vilket har smittat ca 150.000 st i Australien. En gång installerat, det presenterar en falsk affären sida och låter angripare Visa offrets webbläsare i realtid.

Skadlig kod har anpassats för klienter av Commonwealth Bank, ANZ, Westpac, Bank of Queensland, Bendigo Bank, Adelaide Bank, lärare ömsesidig Bank, DefenceBank, Suncorp, Bankwest och HAFFA, enligt ryska företaget grupp-IB, som är att hjälpa bankerna.

"Direkt efter användaren går online och vill göra en överföring, de kommer att avlyssna sin session i webbläsaren och spolat destinationen för överföringen absolut tyst, säger Andrey Komarov, chef för internationella projekt.

Falska CommBank Android säkerhet app mål mobila kunder
Spam kommer från dåliga områden
Men bankerna är inte de enda som kämpar. June Microsoft och FBI - med hjälp av myndigheterna i mer än 80 länder, lanserade inklusive Sverige - ett större angrepp på en av världens största IT-brottslighet ringar, som tros ha stulit mer än $US500 miljoner från bankkonton under de senaste 18 månaderna.

Operationen var att en annan trojan, Citadel. Citadel botnet - en web 1400 nätverk för 5 miljoner zombie datorer infekterade med malware - har använts, Microsoft säger, att stjäla från dussintals finansiella institut, inklusive American Express, Bank of America, Citigroup, eBays PayPal och HSBC. Företaget hävdar Citadel styrs av en chef som kallas Aquabox som säljer malware kit på internet tunnelbanan och tar ett snitt från de pengar som stulits. Programvaran inaktiverar antivirus program på infekterade datorer bo oupptäckta.

Andra bank trojaner agera på liknande sätt. Efter tre år människojakt, är 24-åriga nigerianska man Hamza Bendelladj anklagade i USA i samband med försäljning och support SpyEye, som också tillåter hackare att stjäla offrens bankkonton som de loggar in från sina egna datorer.

– På högsta nivå, de flesta av internet drivs av ansvariga organisationer, men har du några folk som har dålig frön som kommer till en nivå av förfining - riktiga kriminella företag, säger TJ Campana, chef för säkerhet på Microsofts digitala brott enhet vid huvudkontoret USA nära Seattle.

Detta är tekniskt kunniga grupper och individer som begår bedrägerier online, mestadels ekonomiskt bedrägeri. Men det är ett krig som äger rum på internet.

Det är ett krig mellan dem som säger att de försöker göra det dyrare för brottslingar att kringgå deras säkerhet och brottslingarna försöker bo i ett steg före sina friare.

Kriget mot spam - stöttepelaren i malware spridning, falska läkemedel marknadsföring och andra bedrägerier - började för flera år sedan.

Enligt oberoende forskare och författare Brian Krebs analys av spam data från säkerhet säljaren Symantec, har spam volymerna minskat från 6 biljoner meddelanden 2008 till omkring 1 biljoner i slutet av 2012. Bara tre år sedan stod spam för mer än 90 procent av global e-volym. I januari sjönk det till 64,1 procent.

Gemensamma insatser mellan brottsbekämpning i flera länder, Microsoft, säkerhet leverantörer som Symantec och McAfee och säkerhet forskare har nettas stora ingrepp mot skräppost avsändare (Mt Colo ISP avslutades i September 2008) och spam botnät (Waledac i januari 2010, Rustock och Kelihos 2011, Bamital i januari). Kontroll och kommandot servrar för zombie nätverk distribuerar ZeuS och SpyEye malware avskurna också i mars, och gripanden som rör cyber finansiella bedrägerier äger rum mer regelbundet.

DOE


Wednesday, 26 June 2013

Hass Associates Article code 85258083266-HA, News Reviews |Trouble Shooter: Protect yourself from online scammers/ Tumblr

Hass associates article code 85258083266-HA, news reviews

Q. I have heard on many occasions of people being scammed through email and the Internet. I can never imagine being scammed. I'm fairly Internet savvy and my computer and email account have settings to weed out potentially harmful messages. How do people fall for these scams? Why don’t they protect themselves better? Y.D., Quakertown

A. So you’re completely safe then, right? Think again. Scammers are getting smarter, too. Here are 10 things you should be alert for when going through your email inbox. Keeping your guard up now will prevent you from worrying later.

-          Emails that contain a link as the only content in the body, bit.ly or shortened links that don’t display the actual Web address and hyperlinked text that give you no indication of what you would be clicking. When in doubt, don’t click.

-          An inordinate number of other recipients. If you get an email with hundreds of other addresses in the recipient field, yet the message seems directed to only one person, your scam sense should be on high alert.

-          Questionable subject line. If you receive an email from an address you do not recognize and it contains “no subject,” be careful. If you have no idea what you may be opening, it’s best to leave it alone.

-          Intense enthusiasm. All capital letters is not only annoying, it can also indicate spam when it comes to emails. (e.g. I JUST LOST 45 POUNDS WITH THE XX2 PROGRAM!) Overly enthusiastic emails are a sure sign that the information is not what it seems.

-          Grammar and spelling. You don’t have to be an English major to notice odd mistakes in scam emails. Look out for major typos  and scammers that purposely misspell things to avoid your spam filter.

-          Strange requests. If someone is emailing you for medical assistance, it’s just not legit.

-          Urgency. Typically, people don’t use email to notify others in the case of an emergency, when they need "money wired now." If you get an email claiming the situation is a matter of life or death, rest assured that the sender would not be targeting you, a stranger, in the first place.

-          Sensitive information. More often than you may expect, people send personal, secure information to scammers. Scammers operate by asking for personal information (credit card numbers, passwords, etc.) and can disguise emails to look official. Companies, schools, banks and other institutions will not ask you to submit sensitive information in an email.

-          Name-sender disagreement. Scam email addresses often have different names to dupe the recipient. Check the address before assuming that something is legitimate. For instance, an email from Match.com would not have the address of contact @yourbestfriend.com.
-          Guarantees. Please remember that nothing on the Internet is guaranteed. Follow your instincts and pay attention to the sender address, the subject line and promises that are too good to be true.
hass associates article code 85258083266-HA, news reviews

Presentation(s):

Saturday, 15 June 2013

Hass Associates Cyber Tips and Fraud Reviews: Fighting Fraud Offers Insurers Operational Improvements – journalhome


Sanjeev Kumar is the head of the insurance practice at Saama Technologies, a business analytics services company.

hass associates cyber tips and fraud reviews
Ten percent of the incurred losses and loss adjustment expenses each year in the property & casualty insurance industry are due to insurance fraud, according to an analysis by The Insurance Information Institute (III). Worse yet, the number of fraudulent claims are on the increase—statistics from the National Insurance Crime Bureau (NICB) show a 19 percent increase in questionable claims from 2009 to 2011.
However, most suspicious claims are paid by the insurers; it is estimated that today only one in five fraudulent claims are detected or denied by insurers.  Thus insurance fraud costs insurers tens of billions of dollars each year in an industry where margins are thin, and as a result increases premiums for everyone.
P&C insurance fraud may be committed at different points in the transaction, most typically by:
·         Applicants when they misrepresent facts on an insurance application.
·         Policyholders as they file false or inflated claims (or deliberately perpetrate a crime, such as arson).
·         Third-party professionals, such as body shops, that provide services to claimants through excessive billing of vehicle body parts or repair work.
·         Employees, such as adjusters, who may be ‘involved’ in the group.
·         Agents who may backdate a policy prior to loss date.
Fraud is not just limited to property and casualty insurance.  According to the National Health Care Anti-Fraud Association, up to ten percent of the nation’s annual healthcare outlay is lost to fraud and abuse.  Fraud in the healthcare insurance industry occurs in multiple forms, such as stolen physician or patient identities, phantom providers and patients, up-coding, unnecessary cosmetic services, false bills, unnecessary diagnostic services, overtreatment, stacked diagnoses and high-fee services.
If insurers can identify and deny fraudulent claims, they not only improve their loss ratio (which increases margins), but more importantly, they also lower future increases in premiums (which gives them a competitive advantage). Fraud analytics addresses this issue by enabling insurers to identify fraud and alert investigators for further analysis. hass associates cyber tips and fraud reviews
Further Information:  CLICK HERE

Read Also:

Friday, 7 June 2013

Hass Associates Cyber Warning Tips and Reviews: Protecting your business from cyber attacks - flixya

It is hard to ignore the increasing number of cyber-attacks targeting large corporations and governmental organisations. New stories are appearing almost daily exposing the lengths cybercriminals are going to in order to steal sensitive business and customers' personal information from large corporations and businesses.
hass associates cyber warning tips and reviews
While large corporations still continue to garner a lot of attention from cybercriminals, the reality is that SMBs are also increasingly becoming targets for cyber-attacks. In fact, according to the latest Symantec Internet Security Threat Report, 31 per cent of targeted attacks in 2012 were on businesses with less than 250 employees.
So why are cybercriminals interested in SMBs? Don't they have bigger fish to fry?
The question many SMBs may ask is "Why us and not a larger company with more profits or customer information to steal?" Unfortunately the answer is simple: it can be easier. SMBs, on average, have less money and resources invested into internet security and protection, making them an easier target.
Furthermore, SMBs generally conduct business with many enterprises, and today's sophisticated hackers see them as a potential backdoor into these larger organizations. Known as the "watering hole" technique, an attacker compromises a website, such as a blog or small business website, which is known to be frequently visited by the victim of interest, so when the victim later visits the compromised website, a targeted attack payload is silently installed on their computer. In 2012, the number of web-based attacks increased by one third and many of these attacks originated from the compromised websites of small businesses. It is important for SMBs to be aware of not only what to do if their company is attacked, but also what they can do to prevent this from happening in the future.
What type of attacks can SMBs expect?
Some attacks are directly into your business - trying to penetrate your website or internal networks. These attacks can be extremely hard to identify, however, lagging programs or consistently slow internet can be small signs that something is wrong, as well as more obvious irregularities such as strange transactions on your bank statements or unusually high traffic to and from your customer databases. There are a number of ways a company can be targeted, and it does not always have to be a direct attack on a company's internal systems or financial details. In recent years, Australian retail companies have experienced an increase in reputational attacks where cybercriminals create fake websites or emails to mislead consumers and steal their personal details. This type of attack is very subtle and can be difficult for SMBs to even know it is happening.
Ransomware became a bigger challenge for small businesses in 2012. Ransomware locks your computer and demands a release fee. The malware is often quite sophisticated and difficult to remove. Ransomware is a category of malicious software which, when run, disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom. Victims usually end up with ransomware from visiting infected websites. The ransom typically ranges from $50 to $400. Ransomware scams are extorting at least $5 million a year. One group detected was attempting to infect 500,000 computers over an 18-day period*.
So, what can you do about it?
First Response
If you feel that your network has been breached or you have been the victim of a cyber-attack you need to act quickly. Basic steps include; quarantine the computers that were affected; remove the malware; restore the computers to their original condition; reinstall systems and applications; scan for malware; restore company's data; and start thinking about how you can increase your security.
It's also important to notify customers and stakeholders of data breaches. Particularly if the company experiences a reputational attack, offering assistance and advice will help alleviate any brand damage caused by the security breach. This will enable stakeholders to take proactive steps to protect themselves including changing their passwords and notifying their financial institutions of potential fraudulent transactions or account breaches.
hass associates cyber warning tips and reviews
Read more article about  Cyber Security
2.     Hass Associates

Sunday, 26 May 2013

HSB introduces new coverage to protect small businesses from cyber-attacks, cyber warning hass associates reviews, article code 85258083266-HA


 The Hartford Steam Boiler Inspection and Insurance Company (HSB) has launched a new cyber risk insurance coverage to safeguard smaller commercial organizations from growing information security exposures threats.
Providing broad coverage with limits up to $100,000 to protect the risks typical of small organizations, HSB CyberOne helps policyholders to recover from damage to systems caused by a computer attack.
The solution also offers defense and liability coverage for certain lawsuits that allege third-party damage resulting from a failure by the insured to adequately secure its own computer system.
Hartford Steam Boiler president and chief executive officer Greg Barats said HSB CyberOn has been developed as a simple way for a business to help protect its computer systems against cyberattacks.
''It's a logical extension of Hartford Steam Boiler's series of products for smaller businesses that cover identity theft, data breach and data risks from equipment breakdowns,'' Barats added.
HSB CyberOne proves to be more affordable than products underwritten one policy at a time for insurers as it is added to a group of their small business policies.
Capable of being included as part of a business owners product (BOP) or a Commercial Multi-Peril (CMP) policy, the product also makes it convenient for customers and agents to access and easier for insurers to administer.

A member of Munich Re, HSB provides a range of specialty insurance coverages for business, home and farm, since 2009.

Sunday, 12 May 2013

Hass and Associates Online Crime Ware Warning and Online Fraud Watch



It’s the last thing security professionals want to see: A new hacking method that makes it even harder to detect suspect code in emails. The method is actually a stealthy combination of two favorite attack modes, and it shows that hackers are pulling out all the stops to ensnare computer users in their webs.
Phishing and spear phishing have long been thought to be mutually exclusive hacking tricks, but cybercrooks have found a way to combine the two in a technique called longline phishing.

“The technique allows you to hit a lot of people very quickly and largely go undetected,” Dave Jevans, founder and CTO of Marble Security and founder of the Anti-Phishing Work Group, told TechNewsWorld.

With spear phishing, which is typically used as a vehicle for advanced persistent threat attacks like the recent one on The New York Times, a select group of connected people are targeted with a highly credible email message based on extensive research of the targets’ backgrounds.
“With longlining, you can get hundreds of people exposed to a website that will infect their computers,” Jevans noted.

He explained that longliners — named after commercial fishermen who use long lines of hooks to catch fish — might send 100,000 emails from 50,000 IP addresses, which makes it difficult to identify an email from a particular server as hacking bait.