Hackers Steal Customers’ Credit Cards From Newegg Electronics Retailer

HACKERS STRIKE AGAIN!

“The notorious hacking group behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.” Continue reading “Hackers Steal Customers’ Credit Cards From Newegg Electronics Retailer”

Advertisements

Android OS API-Breaking Flaw Offers Useful WiFi Data to Bad Actors

An “API-breaking” vulnerability has been uncovered that potentially exposes Android device systems data to rogue apps — information that could be very useful to bad actors.”

Source: Android OS API-Breaking Flaw Offers Useful WiFi Data to Bad Actors

Android OS API-Breaking Flaw Offers Useful WiFi Data to Bad Actors

T-Mobile Hacked!

T-Mobile Hacked — 2 Million Customers’ Personal Data Stolen

T-Mobile confirmed that the telecom giant suffered a massive security breach on its US servers on August 20 that may have resulted in the leak of “some” personal information of up to 2 million T-Mobile customers. Though no financial information was stolen, personal data such as address and names has been exposed.  Continue reading “T-Mobile Hacked!”

Phishing attack on Augusta University Health leads to breach exposing info on 400K persons

scmagazine-The university discovered the intrusion by an unauthorized third party on Sept. 11, 2017 that it occurred but only realized data had been breached through a report from outside security investigators on July 31.

Source: Phishing attack on Augusta University Health leads to breach exposing info on 400K persons

BlackIoT Botnet: Can Water Heaters, Washers Bring Down the Power Grid?

threatpost.com – We live in a world where washing machines text us when a load of laundry is finished and refrigerators can email grocery lists; but for all the convenience, it turns out that these high-wattage applia….Source: BlackIoT Botnet: Can Water Heaters, Washers Bring Down the Power Grid?

ARE ALL HACKERS CREATED EQUALLY?

The few hackers that no one really talks about

First let’s explain what a hacker is; a hacker is anyone who exploits a weakness in order to gain unauthorized access. When people think of the word ‘hacker’ they may think of someone in dark clothing hiding from daylight behind a computer screen committing crimes. But did you know that there are many different types of hackers out there. Keep in mind that not all hackers are bad and many hackers hack for different reasons.  Continue reading “ARE ALL HACKERS CREATED EQUALLY?”

Walmart will use audio surveillance technology to monitor employees and customers

Walmart Tuesday filed a patent for audio surveillance technology to record customers and employees to proposedly focus on minute details of the shopping and checkout.

Wal-Mart will soon be recording your audio without your consent.

Imagine walking into Wal-Mart and you start to engage in a casual conversation with your family or friends. Without a second thought, you discuss private matters with your companions thinking your conversation is confidential. Imagine months later realizing that the private conversation that you had could have been recorded. Continue reading “Walmart will use audio surveillance technology to monitor employees and customers”

The Red Hen restaurant that refused to serve Sarah Sanders was hit by a cyberattack

White House deputy press secretary Sarah Huckabee Sanders.

The scammers likely weren’t trying to take a political stand, and instead hoped to capitalize on heightened internet traffic to the website because of the headlines, says the researcher who publicized the attack.

It seems that there may be some negative side effects from having your business pushed into political conundrum. As the spotlight shone on the Red Hen restaurant, it caught the eye of a hacker. The website recently suffered a spam SEO compromise. Malwarebytes LABS noted that there was a huge collection of Viagra spam text embedded within the site. This caused a huge spike in the amount of hits on the site. This type of attack is called Spamdexing. 
Continue reading “The Red Hen restaurant that refused to serve Sarah Sanders was hit by a cyberattack”

The House passes a bill to protect our industries from cyberattacks

The House lawmakers has finally approved a cybersecurity legislation on Monday. This bill will secure the technologies used to protect critical infrastructure from any type of cyberattacks. The bill will still need to get approved by the Senate before being signed into law by the President.

Continue reading “The House passes a bill to protect our industries from cyberattacks”

How to disappear from the Internet

Are you tired of watching the news and seeing the latest privacy breach within your favorite social media sites? Are you tired of organizations mishandling of the data that you entrusted with them? Do you want to disappear from the Internet? Do you want to escape from your digital past? Do you know how? Continue reading “How to disappear from the Internet”

Procrastination…an old enemy.

Procrastination is a formidable adversary with a friendly face…and it is time to fight back!

Procrastination is both relentless and restless in its efforts of domination and control. This lifelong foe is in a constant state of war with personal advancement and growth. The casualty list is extensive to include: missing important opportunities, letting precious moments slip past with loved ones, opting out of physical body maintenance in favor of doing it later and so much more. The list continues in similar fashion with a familiar trend. We often gravitate to what is easiest in the moment and not what is ultimately best for us. Continue reading “Procrastination…an old enemy.”

MysteryBot Android trojan aims at banking apps

Triple threat malware
Security researchers have discovered a new type of malware with a 3-legged threat: banking trojan, keylogger, and mobile ransomware in one.

A new triple threat malware has arisen and is plaguing Android devices. This malware can place an overlay screen on top of your login screen and steal your login information.The malware is flawless in its attempts to masquerade as an legitimate app.  Continue reading “MysteryBot Android trojan aims at banking apps”

Adidas phishing campaign promises free shoes, offers $50 subscription instead

An Adidas phishing campaign is offering potential victims a “free” $50 per month subscription via all under the promise of free shoes

Adidas has fallen victim to the latest phishing attempt. This campaign promises that their victims will receive free shoes and money. The construction of this email appears legit. However, one may notice that the dot is missing from the letter ‘i’ in the word Adidas. Many times phishing email look very similar to an actual website and that is generally what tricks their victims. When receiving email from site that seem like it is coming from a legitimate source, make sure that you verify the source of the site as will as the contents before give away any private information. If you are suspicious about the source of an email and the legitimacy of its contents report the email and delete its contents immediately. 

Read the entire post at its source on SCCYBERCRIME: Adidas phishing campaign promises free shoes, offers $50 subscription instead