Sunday, May 19 2013 5:58 PM EDT2013-05-19 21:58:26 GMT
Source: Louisiana State Police
Authorities are urging motorists to avoid I-10 West and East bound at mile marker 25 due to a tanker truck on fire. Fire crews are still working to extinguish flames on an 18-wheel oil tanker. LouisianaMore >>
Louisiana State Police is investigating an oil tanker tractor fire on Interstate 10 that caused major traffic delays Sunday afternoon. More >>
Friday, May 17 2013 9:05 PM EDT2013-05-18 01:05:04 GMT
The Southwest Louisiana Tea Party movement began picking up steam in 2009 as members from throughout the five parish area began gathering for rallies and becoming more visible and involved in local governmentMore >>
The Southwest Louisiana Tea Party movement began picking up steam in 2009 as members from throughout the five-parish area began gathering for rallies and becoming more visible and involved in local government and the political scene.More >>
Friday, May 17 2013 8:55 PM EDT2013-05-18 00:55:58 GMT
An arrest has been made in the 1962 death of Mary Horton Vail. Vail was found dead in the Calcasieu River in October 1962, her husband, Felix Vail, claimed she was the victim of a boating accident. TheMore >>
Mary Horton Vail was found dead in the Calcasieu River in October 1962. Her husband, Felix Vail, claimed she was the victim of a boating accident.More >>
Friday, May 17 2013 6:17 PM EDT2013-05-17 22:17:04 GMT
Friday marks the anniversary of the first woman reported missing in the Jeff Davis Eight case. On May 17, 2005, 28-year-old Loretta Chaisson Lewis went missing. Three days later, her body was found floatingMore >>
Friday marks the anniversary of the first woman reported missing in the Jeff Davis Eight case.More >>
Friday, May 17 2013 5:47 PM EDT2013-05-17 21:47:38 GMT
More than 825 students - the largest graduating class in McNeese State University history - are expected to receive degrees at the university's spring commencement ceremony at 10 a.m. Saturday, May 18,More >>
More than 825 students - the largest graduating class in McNeese State University history - are expected to receive degrees at the university's spring commencement ceremony at 10 a.m. Saturday at Burton Coliseum.More >>
Local News, Weather, Traffic, Sports, Stocks, Movies on your Cell PhoneMore >>
Get local news, weather, sports, and video on your mobile device.More >>
CHARLOTTE, NC (WBTV) -
The BBB has a warning about the top five cyber threats in 2013.
The year ahead will feature new and increasingly sophisticated means to capture and exploit your personal information to steal your identity.
Computer hackers are already at work to find weaknesses in new and emerging technologies.
"People get very excited with new apps that expand their use of the Internet in ways that were previously not possible," said BBB President Tom Bartholomy. "However, the BBB urges you to proceed with caution when using new tech tools because they do not have a history of reliability and security."
The Better Business Bureau has the top five cyber threats expected in 2013:
Counterfeit QR Codes: A Quick Response Code is a barcode that you can scan with your smartphone and it directs you to websites or downloadable content. Similar to skimmers that fit over credit card machines to swipe your credit card, counterfeit QR Codes can be affixed over legitimate barcodes to download malware to your phone or lead you to unsecure websites.
Mobile Wallet Vulnerabilities: Near field communication (NFC) allows two devices to exchange data when they are in the proximity of each other. Smartphone manufacturers, retailers and airlines are beginning to use this information. The vulnerability of near field communication technology is that scammers may use scanners to capture stored credit card information when you are within range of their scanners without you even knowing it happened.
Cloud-Based Botnets: Cloud computing is a growing area of computer technology. The ‘cloud' offers you the ability to select the precise computing power you need. When you use cloud-computing technology, you are linked to other cloud users and this creates a massive virtual networks. Hackers exploit this linked network via phishing schemes which infect users' computers with viruses. The potential exists for hackers to infect this massive network with viruses that would steal credit card and personal information from the computers that are linked through the ‘cloud'.
Search History Poisoning: According to the Emerging Cyber Threats Report 2013 from Georgia Tech, compromised search histories can follow users from computer to computer which could increase the likelihood that you could visit malicious websites without knowing it.