A court ruling means that Yahoo! and its parent company, Verizon, could end paying a heavy price for the huge breaches that saw more than 1 billion people’s details compromised.
Last Friday we covered some of the security issues travelers can face when staying at a hotel. Today we are going to look at air travel – specifically the bad things that can happen to you if you carelessly discard or foolishly post a picture online of your airline boarding pass.
For some reason, people like to post images of their boarding passes on ...Continue Reading →
The Equifax breach has been all over the news this weekend, and it should be. This is worse than they are telling us. It most certainly DOES affect you, if you are adult and have ever purchased a car or opened a credit card account. Don’t wait to be told you are a victim. Assume you are a victim.
In a world where we are all suffering from “breach fatigue,” having suffered through dozens if not hundreds of these revelations about ...Continue Reading →
I was recently introduced to a personal cybersecurity service called Rubica. If you are looking for a company that can provide you and your family or your small business with the kind of cybersecurity operations that are available to larger companies, this may be for you.
A bad day for me starts with a client calling to say, “I was hacked,” or to hear that they have fallen prey ...Continue Reading →
Are you are the owner of a business, or the CEO or other C-level employee? You are prime target for cyber-criminals. Specifically, your email account is a highly desirable target that can be used to impersonate you for invoicing, payment interception, or wire transfer fraud.
If you think you are too small to be a target, you are wrong. I worked on a case of a seven-person company whose owner had an MSN email account. They sent an invoice by email ...Continue Reading →
As long as we are on the subject of telephone fraud, here is a post inspired by a recent article from Naked Security. It reminded me that not all attacks are high-tech cyber-attacks. The phone is still an effective tool used by criminals to extract cash from their victims, and the losses can be in the thousands.
Here are some different scams run by these scammers:
- Tech support scam: Callers ...
On Monday and Wednesday we looked at email account hijacking, how it happens, and what can happen after the account is controlled by an attacker. Today we will see how an attacker could use the beachhead they established in your email account to extend their intrusion.
They have already proven that you are susceptible to phishing and other social engineering exploits. So sending the victim other phishing emails that allow more access ...Continue Reading →
On Monday we opened this discussion about hijacked email accounts, and showed some examples of the phishing tricks that attackers use to get you to reveal your email password. Today we will explore the many useful and profitable exploits that a compromised email account offers a cyber-criminal or other attacker.
I consider email account compromise to be one of the most personally harmful cyber-exploits. When another person has access to your email ...Continue Reading →
First thing, a hijacker would not announce his or her presence in your account. Staying undetected is important so you do not change your password. Depending on what the attacker is doing with your email account, there is a significant probability that you would not know your account was compromised for several days, weeks, or even years!
In order ...Continue Reading →
When a smartphone is stolen, it is a disaster. You have just given the keys to your online life, your email, social media accounts, and credit cards you have synced with an app. If you have the new smart locks on your home or office, you also gave them literal keys, the ability to open those locks. If you have live camera feeds ...Continue Reading →