New Phishing Scam Uses FBI and IRS Logos

There is a new twist on an old tax scam appearing in email inboxes recently.  The new phishing exploit uses both IRS and FBI emblems to scare recipients into provide personal information on a downloadable questionnaire.  You can read the official warning here.

I like to remind people that the IRS only communicates with taxpayers by postal mail.  Sometimes they might send a US Marshal.  And the FBI certainly would not be sending an email when they can ...

Continue Reading →
0

Sharing Your Boarding Pass Is A Bad Idea

Last Friday we covered some of the security issues travelers can face when staying at a hotel.  Today we are going to look at air travel – specifically the bad things that can happen to you if you carelessly discard or foolishly post a picture online of your airline boarding pass.

For some reason, people like to post images of their boarding passes on ...

Continue Reading →
0

What You Can Do After The Equifax Breach

The Equifax breach has been all over the news this weekend, and it should be.  This is worse than they are telling us.  It most certainly DOES affect you, if you are adult and have ever purchased a car or opened a credit card account.  Don’t wait to be told you are a victim.  Assume you are a victim.

In a world where we are all suffering from “breach fatigue,” having suffered through dozens if not hundreds of these revelations about ...

Continue Reading →
0

Need a Personal Cyber Security Staff? Rubica May Be the Answer

I was recently introduced to a personal cybersecurity service called Rubica.  If you are looking for a company that can provide you and your family or your small business with the kind of cybersecurity operations that are available to larger companies, this may be for you.

A bad day for me starts with a client calling to say, “I was hacked,” or to hear that they have fallen prey ...

Continue Reading →
0

Not All Attacks Are Cyber Attacks – Watch For Phone Scams Too

As long as we are on the subject of telephone fraud, here is a post inspired by a recent article from Naked Security.  It reminded me that not all attacks are high-tech cyber-attacks.  The phone is still an effective tool used by criminals to extract cash from their victims, and the losses can be in the thousands.

Here are some different scams run by these scammers:

  • Tech support scam:  Callers ...
Continue Reading →
0

Email Account Hijacking – Part 3 Extending the Exploit

On Monday and Wednesday we looked at email account hijacking, how it happens, and what can happen after the account is controlled by an attacker.  Today we will see how an attacker could use the beachhead they established in your email account to extend their intrusion.

They have already proven that you are susceptible to phishing and other social engineering exploits.  So sending the victim other phishing emails that allow more access ...

Continue Reading →
0
Page 5 of 11 «...34567...»