Tag Archives: FBI

Phony Tech Support Awareness

It’s not just tech support, did you see my previous article on Paying the IRS with Target Gift Cards? I’m glad they were shut down and arrests were made. If you think you were scammed, report it here https://www.ftccomplaintassistant.gov/ or … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Phony Tech Support Awareness

CEO Fired After Fake Email Loses Firm $47 Million

FACC, in May has let their CEO, Walter Stephan, go after a fake email made it’s way to the financial controllers office and €52.8 million ($58 million USD) was wired out of the company. It caused their stock to drop … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on CEO Fired After Fake Email Loses Firm $47 Million

Smart Farming Vulnerabilities

Smart farming is a real thing, it enables farmers to monitor their crops and gather visual analytics on big data. This allows for farmers to anticipate crop availability and forecast pricing. This data is very valuable to the farmers and costly … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Smart Farming Vulnerabilities

Phishing Outlook Looks Legitimate

When an attacker is using Microsoft Office 365’s Outlook paired with Microsoft Lync, it makes phishing emails look authentic and harder to detect without really checking it out. See graphic below.

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing Outlook Looks Legitimate

A Letter From Tim Cook at Apple

Below is a letter from Tim Cook of Apple. February 16, 2016 A Message to Our Customers The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on A Letter From Tim Cook at Apple

Hackers Hold Hospital Healthcare Data Hostage

Hollywood Presbyterian Medical Center’s data systems have been infected with encrypted ransomware. The hospital says patient care has not been compromised, though the cyber-attack has forced them to revert to paper registrations and medical records and send patients seeking emergency … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hackers Hold Hospital Healthcare Data Hostage

Con Job on the Department of Justice!

A hacktivist, who had a compromised email account belonging to a DOJ employee, was poking around the DOJ portal. With the determination to get further in, and getting stopped with a challenge of needing a token code they were stuck… … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Con Job on the Department of Justice!

Remember the Fappening?

Some time ago, back in 2014, I wrote about the Fappening, when someone hacked a bunch of Apple cloud accounts and stole personal pictures of famous celebrities. Turns out that some of the victims to this hack was due to … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Remember the Fappening?

Unbreakable Encryption!!!

Cryptowall is a new strain of Cryptolocker. So strong in fact that the FBI’s Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program, Joseph Bonavolonta, normally advises those who have fallen for phishing attacks that release and … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Unbreakable Encryption!!!

Business Email Compromise Leads to $737,000 Transfer to China

The FBI classifies “phishing that leads to loss” as Business Email Compromise (BEC). In a recently released story that closely matches the BEC hack in Omaha I wrote about back in February, another company fell victim to a spearphishing attack … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Business Email Compromise Leads to $737,000 Transfer to China