One of my IT associates got an email that had one of her actual passwords in it, and threatened to reveal information unless she paid a ransom in Bitcoin. This seems to be getting a lot of traction, so beware. Do not pay the extortion demand. First, this is a scam. They got your password from one of the hundreds of breaches we have had in the last several years. Check your email address on haveibeenpwned.com to see where yours came from. Second, these are criminals, and you cannot trust them to keep their word, and if you pay them once, they will be back for more. Read these articles for details.
- Extortion Phish: Your Password is XXX
- Scam Alert: Sextortion Email Using Real Passwords
- Krebs on Security – Sextortion story
New Bluetooth Vulnerability
A “Bluetooth snooping” bug, dubbed CVE-2018-5383, was just announced – are you patched, and how can you tell?
Confused by all the lingo surrounding cryptocurrencies like Bitcoin and Etherium? If so, you’re not alone. Here are the essential cryptocurrency terms you should know.
A great tutorial if you are using Wordfence to protect your WordPress website.
Internet users have grown used to the idea that they can be tracked and profiled as they browse the web, but what about the specific risks of smartphones?
The latest release of the official Raspbian OS will make it easier to find the best software for the credit card-sized board.
Cybercriminals have found a way to strip digital device users of their personal data, using a tool called “smishing.” Smishing scams compromise the target’s cell phone through texts or SMS messages, then swipe the target’s personal data once the user clicks on the text link. Learn more about how you could be targeted through smishing.
07/13/2018 06:41 PM EDT Original release date: July 13, 2018
The Internet Crime Complaint Center (IC3) has released an alert on business email compromise scams. This type of scam targets businesses and individuals by using social engineering or computer intrusion to compromise legitimate email accounts and conduct unauthorized fund transfers or obtain personally identifiable information.