Tuesday, May 21 2013 10:34 AM EDT2013-05-21 14:34:41 GMT
NOTE: Photos and videos will be added to this story later in the evening. The Walthall County Sheriffs Department along with The Humane Society of the United States are in the process of raiding a puppyMore >>
Among the dogs, many are dead, and skeletal remains were mixed with living animals in small, dark, filthy enclosures.More >>
Monday, May 13 2013 12:24 PM EDT2013-05-13 16:24:04 GMT
MARION COUNTY, MS (WDAM) - A weekend-long drug raid left 22 individuals behind bars, and more arrests to come. According to Marion County Sheriff Berkley Hall, the drug raid is the result of severalMore >>
A weekend-long drug raid left 22 individuals behind bars, and more arrests to come.More >>
Monday, May 20 2013 4:42 PM EDT2013-05-20 20:42:47 GMT
The Humane Society of South Mississippi (HSSM) is heading back to Gulfport with more than 100 small breed dogs rescued from an alleged puppy mill in Tylertown Monday. The HSSM assisted the Humane SocietyMore >>
The Humane Society of South Mississippi (HSSM) is heading back to Gulfport with more than 100 small breed dogs rescued from an alleged puppy mill in Tylertown Monday.More >>
Tuesday, May 21 2013 10:36 AM EDT2013-05-21 14:36:49 GMT
(RNN) – A day after long track tornadoes devastated Shawnee and Edmond, OK, another round has begun near Oklahoma City.KOCO broadcast a slow rotating cloud that slowly extended down towards the groundMore >>
Dozens of people have died after a second day of tornadoes twisted through Oklahoma, this time taking aim at the town of Moore, south of Oklahoma City.More >>
Monday, May 20 2013 6:41 PM EDT2013-05-20 22:41:59 GMT
Four suspects were jailed after Harrison County Sheriff Melvin Brisolara said a burglary took place at a home at the 15000 block of Sara Lane in Saucier on Sunday. Once deputies arrived to the home theyMore >>
Four suspects were jailed after Harrison County Sheriff Melvin Brisolara said a burglary took place at a home at the 15000 block of Sara Lane in Saucier on Sunday.More >>
CHARLOTTE, NC (WBTV) -
The BBB has a warning about the top five cyber threats in 2013.
The year ahead will feature new and increasingly sophisticated means to capture and exploit your personal information to steal your identity.
Computer hackers are already at work to find weaknesses in new and emerging technologies.
"People get very excited with new apps that expand their use of the Internet in ways that were previously not possible," said BBB President Tom Bartholomy. "However, the BBB urges you to proceed with caution when using new tech tools because they do not have a history of reliability and security."
The Better Business Bureau has the top five cyber threats expected in 2013:
Counterfeit QR Codes: A Quick Response Code is a barcode that you can scan with your smartphone and it directs you to websites or downloadable content. Similar to skimmers that fit over credit card machines to swipe your credit card, counterfeit QR Codes can be affixed over legitimate barcodes to download malware to your phone or lead you to unsecure websites.
Mobile Wallet Vulnerabilities: Near field communication (NFC) allows two devices to exchange data when they are in the proximity of each other. Smartphone manufacturers, retailers and airlines are beginning to use this information. The vulnerability of near field communication technology is that scammers may use scanners to capture stored credit card information when you are within range of their scanners without you even knowing it happened.
Cloud-Based Botnets: Cloud computing is a growing area of computer technology. The ‘cloud' offers you the ability to select the precise computing power you need. When you use cloud-computing technology, you are linked to other cloud users and this creates a massive virtual networks. Hackers exploit this linked network via phishing schemes which infect users' computers with viruses. The potential exists for hackers to infect this massive network with viruses that would steal credit card and personal information from the computers that are linked through the ‘cloud'.
Search History Poisoning: According to the Emerging Cyber Threats Report 2013 from Georgia Tech, compromised search histories can follow users from computer to computer which could increase the likelihood that you could visit malicious websites without knowing it.
Be the first to find out about breaking news! To sign up for email alerts from the WLOX Newsroom, just enter your email address below.
Your email address will never be shared with a third party and youMore >>