Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.

Potential Hurricane Florence Phishing Scams

09/14/2018 02:19 PM EDT

NCCIC warns users to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a subject line, attachments, or hyperlinks related to the hurricane, even if it appears to originate from a trusted source.  User should also be wary of fraudulent social media pleas, calls, texts, donation websites, and door-to-door solicitations relating to the hurricane.

FBI Releases Guidance on Defending Against Travel Scams

08/14/2018 10:04 PM EDT

The Federal Bureau of Investigation (FBI) has released an article on building a digital defense against travel scams. FBI explains how scammers trick consumers with “free” vacation ploys. These offers may be fake or involve hidden fees. Legitimate companies will not ask prize winners to pay to claim their reward.

NCCIC encourages consumers to review the FBI Article, the Travel Tips, and NCCIC’s Tip on Avoiding Social Engineering and Phishing Attacks for more information.

US rolls back cyberwarfare rules

The Trump administration has rolled back Obama-era rules that outlined how to launch cyberattacks on other nations.

Romance scam victim allegedly plotted to kill her mother for cash

An identity theft online dating scam led police to uncover texts that detailed the murder-for-hire plot.  Yeah, that’s right, your new boyfriend wants you to bump off Mom, and you agree to it.  Get a clue – seriously.

How some Arizona residents can now have an autonomous car deliver their groceries

Nuro, the self-driving delivery vehicle, is starting a pilot delivery program with Kroger in Scottsdale, AZ.

Google is tracking your location, even when the setting is turned off

Shock! It appears Google can track the location of anyone using some of its apps on Android or iPhone even when they’ve told it not to.  Checking this in Maps can be done by visiting Google’s Account Settings >My Account Activity > Other Account Activity > click ‘Visit Timeline’ under Location History. This should show a history of a user’s movements while using their device.  I did this and Google had the last 5 years of business and personal travel displayed.  Yow!

Are your Android apps listening to you?

This simple setup will help you discover if your apps are listening in on you.

Siri is listening to you, but she’s NOT spying, says Apple

Sharing the surveillance love with iPhone users!  Apple’s working to keep iPhones from eavesdropping on us, through privacy policies, short buffer windows, local storage, and app review.

Firefly Day – September 20th


About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.
  Related Posts

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.