Articles (1 - 5 of 16 total)
RSS Feed
  • Buying Used? Beware of Flood Damaged Cars
    Buying Used? Beware of Flood Damaged Cars

    Hurricane Florence caused a lot of flooding. Flooding has also occurred in the Northeast and other areas this year due to torrential rains. Flooding damages large numbers of vehicles every year. Consumers need to be aware that flood damaged vehicles can appear on used car lots far away from where the flooding occurred.

    Read on...
  • It's More Than Facebook! Protect Your Data
    It's More Than Facebook! Protect Your Data

    Your data is a hot commodity. It's not just Facebook that is collecting your data. Many other sites, companies, and advertisers do, too. Whether it's information that you provide directly or that's collected by tracking you, there are steps that you can take to reduce its collection.

    Read on...
  • It's Time to Review Your Facebook Privacy Settings
    It's Time to Review Your Facebook Privacy Settings

    How often do you check your Facebook privacy and security settings? With the recent revelation that data analytics firm Cambridge Analytica acquired profile information and "likes" on about 50 million Facebook users, it's time to review your settings.

    Read on...
  • What You Need to Know About Peer-to-Peer Payment
    What You Need to Know About Peer-to-Peer Payment

    Peer-to-peer payments are becoming a very popular way for friends to split the bill for a dinner, gift, tickets or other items. These services can be very useful, but should be properly checked out before you use it. The following questions can help you evaluate the various services.

    Read on...
  • About the KRACK Wi-Fi Vulnerability
    About the KRACK Wi-Fi Vulnerability

    Researchers have discovered a vulnerability in the Wi-Fi WPA2 security protocol. This vulnerability affects most devices that can use a Wi-Fi connection. Hackers could exploit this problem to capture all the traffic coming into or out of any device with a Wi-Fi connection such as laptops, phones, routers, tablets, and smart devices. Though to exploit the problem, a hacker would have to be near the device.

    Read on...
Articles (1 - 5 of 16 total)
RSS Feed

Follow Summit Credit Union

E-Alert

Receive an overview of the latest posts in your inbox, every two weeks:

Sign up for e-alerts

Sample an archived e-alert.