FBI Warns of Dangers in ‘Safe’ Websites

Dark Reading cybersecurity news website

FBI Warns of Dangers in ‘Safe’ Websites | #TpromoCom #FBI #CyberSecurity #Cyber | Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web browser sessions — and to assure consumers that their transactions are secure — is also being used by criminals looking to gain victims’ trust in phishing campaigns. The FBI has issued a public service announcement defining the problem and urging individuals to go beyond simply trusting any “https” URL.

Browser publishers and website owners have waged successful campaigns to convince consumers to look for lock icons and the “https:” prefix as indicators that a website is encrypted and, therefore, secure. The problem, according to the FBI and security experts, is that many individuals incorrectly assume that an encrypted site is secure from every sort of security issue.

To read the remainder of this news article, click here.

Please follow and like us:
error

The Hotel Hijackers White Paper

The Hotel Hijackers White Paper | #TpromoCom #Hotel #Hacker #CyberSecurity | From booking a room to the payments made at shops and restaurants, hotel chains have complex networks that save enormous amounts of sensitive and private data, just waiting to be compromised.

This makes the hospitality industry one of the main targets for cybercriminal activity.

Download our whitepaper, The Hotel Hijackers, to understand:

  • Why hotel networks became a target of cybercriminals,
  • A history of attacks on the industry
  • How these types of attacks can be avoided

Download Now

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.
Please follow and like us:
error

Nine Charged in SIM Hijacking Scheme

SecurityWeek news and information

Nine Charged in SIM #Hijacking Scheme | #TpromoCom #DOJ #Hacker #Hackers | The United States has indicted nine individuals with online identity theft and related charges, the U.S. Department of Justice announced.

Six of the individuals were charged with wire fraud in connection to the hacking group “The Community,” while three former employees of mobile phone providers were charged with wire fraud in relation to the conspiracy.

Charges were brought against Conor Freeman, 20, of Dublin, Ireland; Ricky Handschumacher, 25 of Pasco County, Florida; Colton Jurisic, 20 of, Dubuque, Iowa; Reyad Gafar Abbas, 19, of Rochester, New York; Garrett Endicott, 21, of Warrensburg, Missouri; Ryan Stevenson, 26, of West Haven, Connecticut; Jarratt White, 22 of Tucson, Arizona; Robert Jack, 22 of Tucson, Arizona; and Fendley Joseph, 28, of Murrietta, California.

The defendants are alleged members of “The Community,” a hacking group focused on stealing victims’ identities to perform cryptocurrency theft via “SIM Hijacking.”

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO
Please follow and like us:
error

Majority of Encrypted Email Clients Vulnerable to Signature Spoofing

Majority of Encrypted Email Clients Vulnerable to Signature Spoofing | #TpromoCom #Email #Encryption #Security | Researchers have found that encrypted emails are not always as secure as we might think. From more than two dozen popular encrypted email clients, they found that the majority are vulnerable to one or more signature spoofing attacks.

Good cryptography is nearly impossible to break with contemporary commercial computers — so attackers don’t often attempt to. Instead, they attack the implementation and use of cryptography, where the weaknesses are more often found. This is especially true for email, where the implementation of encrypted emails is particularly challenging.

Researchers from the Ruhr University Bochum and Munster University of Applied Sciences have investigated (PDF) the implementation of the two major email encryption standards, OpenPGP and S/MIME, and have found them largely wanting. While the use of encrypted emails is not widespread, wherever it is used is likely to secure valuable or particularly sensitive content. So, it is disturbing that the researchers found flaws in the design of many leading secure email clients. Fourteen out of 20 tested OpenPGP-capable clients, and 15 out of 22 clients supporting S/MIME were susceptible to digital signature spoofing.

To read the remainder of this news article, click here.

Please follow and like us:
error

Press Release: NVT Phybridge Warns All Partners, Customers and Stakeholders Regarding Potential Fraudulent Communications, Requests and Misuse of Company Identity

NVT Phybridge Warns All Partners, Customers and Stakeholders Regarding Potential Fraudulent Communications, Requests and Misuse of Company Identity | #TpromoCom #Cyber #Fraud #Identification | In the wake of fraudulent messages concerning the IT industry, NVT Phybridge wishes to alert its partners, stakeholders, customers, suppliers, and all third parties that could be the target of such malicious solicitations.

NVT Phybridge has been made aware of instances of attempted identity theft designed to deceive current or potential company stakeholders through the use of fraudulent tactics. This notice is a reminder that valid and legitimate email addresses belonging to NVT Phybridge follow the naming conventions below:

  • firstname.lastname@nvtphybridge.com
  • firstname.lastname@phybridge.com
  • FirstnameinitialLastname@nvt.com
  • department@nvtphybridge.com
  • mailto:firstname.lastname@nvtphybridge.com
  • function@nvtphybridge.com

Any communications received appearing to be from NVT Phybridge that do not follow the above conventions are not from NVT Phybridge and should be reported immediately to support@nvtphybridge.com. NVT Phybridge will not be held responsible for any harm and/or damages that may result from the fraudulent use of its name or reputation. Accordingly, you should employ an appropriate level of caution to verify the identity of persons corresponding with you. If you suspect you have received a fraudulent message from a correspondent purporting to represent NVT Phybridge, please contact NVT Phybridge to verify its validity. NVT Phybridge is implementing preventative measures in an effort to help prevent and/or combat these malicious tactics.

NVT Phybridge is headquartered in Oakville, Ontario, Canada; with regional sales managers operating throughout the United States of America, México, Colombia, Europe and India – as well as some regions within Asia and the Middle East. Click here for a full list of sales managers in each region.

NVT Phybridge
3457 Superior Crt, Unit 3
Oakville, Ontario L6L 0C4

Please follow and like us:
error

Investigator Says Amazon Chief’s Phone Hacked by Saudis

Investigator Says Amazon Chief’s Phone Hacked by Saudis | #TpromoCom #Amazon #Hacker #CyberSecurity | Everyone’s a target sometime when it comes to cybercrime. The art of avoidance where it involves hackers is certainly of great value as we move further into the 21st Century world of digital thuggery and political terrorism.

Here we have a high official with Amazon, Jeff Bezos, who’s cellphone was allegedly hacked by a foreign entity for what could be construed as an effort to uncover the identity of the individual that murdered a Saudi journalist. Bezos owns The Washington Post which investigated the murder.

Photo: by HubSpot

“Bezos hired Gavin de Becker & Associates to find out how his intimate text messages and photos made their way into the hands of the Enquirer, which reported on the Amazon chief’s extramarital affair, leading to his divorce,” says the author of the Security Week story below. The moral of the story is to trust no one, not even your own mobile device. —Al Colombo

The investigator hired to look into the release of intimate images of Jeff Bezos said Saturday he has concluded that Saudi Arabian authorities hacked the Amazon chief’s phone to access his personal data.

Gavin de Becker linked the hack to extensive coverage by The Washington Post newspaper, which is owned by Bezos, of the murder of Saudi journalist Jamal Khashoggi at the kingdom’s consulate in Istanbul last year.

To read the remainder of this news story, click here.

[image] Security professionals in the electronic protection of commercial and residential structures are invited to join other owners and managers in The Security Coaching Forum on Facebook.
Security professionals in the electronic protection of commercial and residential structures are invited to buy and sell their surplus equipment on Facebook. Click on the banner above .

Please follow and like us:
error

6 Things To Know About the Ransomware That Hit Norsk Hydro

6 Things To Know About the Ransomware That Hit Norsk Hydro | #TpromoCom #Ransomeware #CyberSecurity #Hackers | In just one week, ‘LockerGoga’ has cost the Norwegian aluminum maker $40 million as it struggles to recover operations across Europe and North America.

Dark Reading cybersecurity news website

LockerGoga – the malware that recently disrupted operations at Norwegian aluminum company Norsk Hydro – is the latest example of the rapidly changing nature of ransomware attacks.

CyberSecurity is becoming an extremely important element of online business. Ransomeware is one of the upcoming trends that cause many businesses to falter and fail.

The March 19 attack impacted critical operations in several of Hydro’s business areas across Europe and North America. The attack forced the aluminum maker to resort to manual operations at multiple plants. It crippled production systems belonging to Hydro’s Extruded Solution group in particular, resulting in temporary plant closures and operational slowdowns that are still getting only in the process of getting restored.

In two updates this week, Norsk Hydro described the attack as so far costing it about $40 million.

To read the remainder of this news article, click here.

Tpromo  provides the best in websites and blogs for less money.
Please follow and like us:
error

Chinese Hackers Target 27 Universities to Acquire Military Technology


Chinese Hackers Target 27 Universities to Acquire Military Technology | #TpromoCom #China #Hacker #Hackers | Over two dozen universities in the U.S. and around the world have been singled out for access to maritime military research. (please scroll for more)

Dozens of universities have fallen victim to a cyberattack conducted by Chinese hackers attempting to steal information on military technology.

The University of Washington, the University of Hawaii and the Massachusetts Institute of Technology (MIT) are among at least 27 universities that have been targeted, reports ZD Net.

To read the remainder of this news article, click here.

[divider (image)]
Security company owners, operations managers, and sales managers are invited to join The Coaching Forum on Facebook!
Please follow and like us:
error