cyberfraud

now browsing by tag

 
 

#cyberfraud | #cybercriminals | Cyber Risk Update for Construction Companies | Stoel Rives – Global Privacy & Security Blog®

Source: National Cyber Security – Produced By Gregory Evans

Updated: May 25, 2018:

JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations.

This Privacy Policy describes how JD Supra, LLC (“JD Supra” or “we,”https://www.jdsupra.com/”us,” or “our“) collects, uses and shares personal data collected from visitors to our website (located at www.jdsupra.com) (our “Website“) who view only publicly-available content as well as subscribers to our services (such as our email digests or author tools)(our “Services“). By using our Website and registering for one of our Services, you are agreeing to the terms of this Privacy Policy.

Please note that if you subscribe to one of our Services, you can make choices about how we collect, use and share your information through our Privacy Center under the “My Account” dashboard (available if you are logged into your JD Supra account).

Collection of Information

Registration Information. When you register with JD Supra for our Website and Services, either as an author or as a subscriber, you will be asked to provide identifying information to create your JD Supra account (“Registration Data“), such as your:

  • Email
  • First Name
  • Last Name
  • Company Name
  • Company Industry
  • Title
  • Country

Other Information: We also collect other information you may voluntarily provide. This may include content you provide for publication. We may also receive your communications with others through our Website and Services (such as contacting an author through our Website) or communications directly with us (such as through email, feedback or other forms or social media). If you are a subscribed user, we will also collect your user preferences, such as the types of articles you would like to read.

Information from third parties (such as, from your employer or LinkedIn): We may also receive information about you from third party sources. For example, your employer may provide your information to us, such as in connection with an article submitted by your employer for publication. If you choose to use LinkedIn to subscribe to our Website and Services, we also collect information related to your LinkedIn account and profile.

Your interactions with our Website and Services: As is true of most websites, we gather certain information automatically. This information includes IP addresses, browser type, Internet service provider (ISP), referring/exit pages, operating system, date/time stamp and clickstream data. We use this information to analyze trends, to administer the Website and our Services, to improve the content and performance of our Website and Services, and to track users’ movements around the site. We may also link this automatically-collected data to personal information, for example, to inform authors about who has read their articles. Some of this data is collected through information sent by your web browser. We also use cookies and other tracking technologies to collect this information. To learn more about cookies and other tracking technologies that JD Supra may use on our Website and Services please see our “Cookies Guide” page.

How do we use this information?

We use the information and data we collect principally in order to provide our Website and Services. More specifically, we may use your personal information to:

  • Operate our Website and Services and publish content;
  • Distribute content to you in accordance with your preferences as well as to provide other notifications to you (for example, updates about our policies and terms);
  • Measure readership and usage of the Website and Services;
  • Communicate with you regarding your questions and requests;
  • Authenticate users and to provide for the safety and security of our Website and Services;
  • Conduct research and similar activities to improve our Website and Services; and
  • Comply with our legal and regulatory responsibilities and to enforce our rights.

How is your information shared?

  • Content and other public information (such as an author profile) is shared on our Website and Services, including via email digests and social media feeds, and is accessible to the general public.
  • If you choose to use our Website and Services to communicate directly with a company or individual, such communication may be shared accordingly.
  • Readership information is provided to publishing law firms and authors of content to give them insight into their readership and to help them to improve their content.
  • Our Website may offer you the opportunity to share information through our Website, such as through Facebook’s “Like” or Twitter’s “Tweet” button. We offer this functionality to help generate interest in our Website and content and to permit you to recommend content to your contacts. You should be aware that sharing through such functionality may result in information being collected by the applicable social media network and possibly being made publicly available (for example, through a search engine). Any such information collection would be subject to such third party social media network’s privacy policy.
  • Your information may also be shared to parties who support our business, such as professional advisors as well as web-hosting providers, analytics providers and other information technology providers.
  • Any court, governmental authority, law enforcement agency or other third party where we believe disclosure is necessary to comply with a legal or regulatory obligation, or otherwise to protect our rights, the rights of any third party or individuals’ personal safety, or to detect, prevent, or otherwise address fraud, security or safety issues.
  • To our affiliated entities and in connection with the sale, assignment or other transfer of our company or our business.

How We Protect Your Information

JD Supra takes reasonable and appropriate precautions to insure that user information is protected from loss, misuse and unauthorized access, disclosure, alteration and destruction. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. You should keep in mind that no Internet transmission is ever 100% secure or error-free. Where you use log-in credentials (usernames, passwords) on our Website, please remember that it is your responsibility to safeguard them. If you believe that your log-in credentials have been compromised, please contact us at privacy@jdsupra.com.

Children’s Information


Our Website and Services are not directed at children under the age of 16 and we do not knowingly collect personal information from children under the age of 16 through our Website and/or Services. If you have reason to believe that a child under the age of 16 has provided personal information to us, please contact us, and we will endeavor to delete that information from our databases.

Links to Other Websites

Our Website and Services may contain links to other websites. The operators of such other websites may collect information about you, including through cookies or other technologies. If you are using our Website or Services and click a link to another site, you will leave our Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We are not responsible for the data collection and use practices of such other sites. This Policy applies solely to the information collected in connection with your use of our Website and Services and does not apply to any practices conducted offline or in connection with any other websites.

Information for EU and Swiss Residents

JD Supra’s principal place of business is in the United States. By subscribing to our website, you expressly consent to your information being processed in the United States.

  • Our Legal Basis for Processing: Generally, we rely on our legitimate interests in order to process your personal information. For example, we rely on this legal ground if we use your personal information to manage your Registration Data and administer our relationship with you; to deliver our Website and Services; understand and improve our Website and Services; report reader analytics to our authors; to personalize your experience on our Website and Services; and where necessary to protect or defend our or another’s rights or property, or to detect, prevent, or otherwise address fraud, security, safety or privacy issues. Please see Article 6(1)(f) of the E.U. General Data Protection Regulation (“GDPR”) In addition, there may be other situations where other grounds for processing may exist, such as where processing is a result of legal requirements (GDPR Article 6(1)(c)) or for reasons of public interest (GDPR Article 6(1)(e)). Please see the “Your Rights” section of this Privacy Policy immediately below for more information about how you may request that we limit or refrain from processing your personal information.

  • Your Rights
    • Right of Access/Portability: You can ask to review details about the information we hold about you and how that information has been used and disclosed. Note that we may request to verify your identification before fulfilling your request. You can also request that your personal information is provided to you in a commonly used electronic format so that you can share it with other organizations.
    • Right to Correct Information: You may ask that we make corrections to any information we hold, if you believe such correction to be necessary.
    • Right to Restrict Our Processing or Erasure of Information: You also have the right in certain circumstances to ask us to restrict processing of your personal information or to erase your personal information. Where you have consented to our use of your personal information, you can withdraw your consent at any time.

You can make a request to exercise any of these rights by emailing us at privacy@jdsupra.com or by writing to us at:


Privacy Officer

JD Supra, LLC

10 Liberty Ship Way, Suite 300

Sausalito, California 94965

You can also manage your profile and subscriptions through our Privacy Center under the “My Account” dashboard.

We will make all practical efforts to respect your wishes. There may be times, however, where we are not able to fulfill your request, for example, if applicable law prohibits our compliance. Please note that JD Supra does not use “automatic decision making” or “profiling” as those terms are defined in the GDPR.

  • Timeframe for retaining your personal information: We will retain your personal information in a form that identifies you only for as long as it serves the purpose(s) for which it was initially collected as stated in this Privacy Policy, or subsequently authorized. We may continue processing your personal information for longer periods, but only for the time and to the extent such processing reasonably serves the purposes of archiving in the public interest, journalism, literature and art, scientific or historical research and statistical analysis, and subject to the protection of this Privacy Policy. For example, if you are an author, your personal information may continue to be published in connection with your article indefinitely. When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
  • Onward Transfer to Third Parties: As noted in the “How We Share Your Data” Section above, JD Supra may share your information with third parties. When JD Supra discloses your personal information to third parties, we have ensured that such third parties have either certified under the EU-U.S. or Swiss Privacy Shield Framework and will process all personal data received from EU member states/Switzerland in reliance on the applicable Privacy Shield Framework or that they have been subjected to strict contractual provisions in their contract with us to guarantee an adequate level of data protection for your data.

California Privacy Rights

Pursuant to Section 1798.83 of the California Civil Code, our customers who are California residents have the right to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes.

You can make a request for this information by emailing us at privacy@jdsupra.com or by writing to us at:


Privacy Officer

JD Supra, LLC

10 Liberty Ship Way, Suite 300

Sausalito, California 94965

Some browsers have incorporated a Do Not Track (DNT) feature. These features, when turned on, send a signal that you prefer that the website you are visiting not collect and use data regarding your online searching and browsing activities. As there is not yet a common understanding on how to interpret the DNT signal, we currently do not respond to DNT signals on our site.

Access/Correct/Update/Delete Personal Information

For non-EU/Swiss residents, if you would like to know what personal information we have about you, you can send an e-mail to privacy@jdsupra.com. We will be in contact with you (by mail or otherwise) to verify your identity and provide you the information you request. We will respond within 30 days to your request for access to your personal information. In some cases, we may not be able to remove your personal information, in which case we will let you know if we are unable to do so and why. If you would like to correct or update your personal information, you can manage your profile and subscriptions through our Privacy Center under the “My Account” dashboard. If you would like to delete your account or remove your information from our Website and Services, send an e-mail to privacy@jdsupra.com.

Changes in Our Privacy Policy

We reserve the right to change this Privacy Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our Privacy Policy will become effective upon posting of the revised policy on the Website. By continuing to use our Website and Services following such changes, you will be deemed to have agreed to such changes.

Contacting JD Supra

If you have any questions about this Privacy Policy, the practices of this site, your dealings with our Website or Services, or if you would like to change any of the information you have provided to us, please contact us at: privacy@jdsupra.com.

As with many websites, JD Supra’s website (located at www.jdsupra.com) (our “Website“) and our services (such as our email article digests)(our “Services“) use a standard technology called a “cookie” and other similar technologies (such as, pixels and web beacons), which are small data files that are transferred to your computer when you use our Website and Services. These technologies automatically identify your browser whenever you interact with our Website and Services.

How We Use Cookies and Other Tracking Technologies

We use cookies and other tracking technologies to:

  1. Improve the user experience on our Website and Services;
  2. Store the authorization token that users receive when they login to the private areas of our Website. This token is specific to a user’s login session and requires a valid username and password to obtain. It is required to access the user’s profile information, subscriptions, and analytics;
  3. Track anonymous site usage; and
  4. Permit connectivity with social media networks to permit content sharing.

There are different types of cookies and other technologies used our Website, notably:

  • Session cookies” – These cookies only last as long as your online session, and disappear from your computer or device when you close your browser (like Internet Explorer, Google Chrome or Safari).
  • Persistent cookies” – These cookies stay on your computer or device after your browser has been closed and last for a time specified in the cookie. We use persistent cookies when we need to know who you are for more than one browsing session. For example, we use them to remember your preferences for the next time you visit.
  • Web Beacons/Pixels” – Some of our web pages and emails may also contain small electronic images known as web beacons, clear GIFs or single-pixel GIFs. These images are placed on a web page or email and typically work in conjunction with cookies to collect data. We use these images to identify our users and user behavior, such as counting the number of users who have visited a web page or acted upon one of our email digests.

JD Supra Cookies. We place our own cookies on your computer to track certain information about you while you are using our Website and Services. For example, we place a session cookie on your computer each time you visit our Website. We use these cookies to allow you to log-in to your subscriber account. In addition, through these cookies we are able to collect information about how you use the Website, including what browser you may be using, your IP address, and the URL address you came from upon visiting our Website and the URL you next visit (even if those URLs are not on our Website). We also utilize email web beacons to monitor whether our emails are being delivered and read. We also use these tools to help deliver reader analytics to our authors to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

Analytics/Performance Cookies. JD Supra also uses the following analytic tools to help us analyze the performance of our Website and Services as well as how visitors use our Website and Services:

  • HubSpot – For more information about HubSpot cookies, please visit legal.hubspot.com/privacy-policy.
  • New Relic – For more information on New Relic cookies, please visit www.newrelic.com/privacy.
  • Google Analytics – For more information on Google Analytics cookies, visit www.google.com/policies. To opt-out of being tracked by Google Analytics across all websites visit http://tools.google.com/dlpage/gaoptout. This will allow you to download and install a Google Analytics cookie-free web browser.

Facebook, Twitter and other Social Network Cookies. Our content pages allow you to share content appearing on our Website and Services to your social media accounts through the “Like,”https://www.jdsupra.com/”Tweet,” or similar buttons displayed on such pages. To accomplish this Service, we embed code that such third party social networks provide and that we do not control. These buttons know that you are logged in to your social network account and therefore such social networks could also know that you are viewing the JD Supra Website.

Controlling and Deleting Cookies

If you would like to change how a browser uses cookies, including blocking or deleting cookies from the JD Supra Website and Services you can do so by changing the settings in your web browser. To control cookies, most browsers allow you to either accept or reject all cookies, only accept certain types of cookies, or prompt you every time a site wishes to save a cookie. It’s also easy to delete cookies that are already saved on your device by a browser.

The processes for controlling and deleting cookies vary depending on which browser you use. To find out how to do so with a particular browser, you can use your browser’s “Help” function or alternatively, you can visit http://www.aboutcookies.org which explains, step-by-step, how to control and delete cookies in most browsers.

Updates to This Policy

We may update this cookie policy and our Privacy Policy from time-to-time, particularly as technology changes. You can always check this page for the latest version. We may also notify you of changes to our privacy policy by email.

Contacting JD Supra

If you have any questions about how we use cookies and other tracking technologies, please contact us at: privacy@jdsupra.com.

Source link

The post #cyberfraud | #cybercriminals | Cyber Risk Update for Construction Companies | Stoel Rives – Global Privacy & Security Blog® appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Cottage Grove Sentinel | Building a Digital Defense Against Medicare Scams

Source: National Cyber Security – Produced By Gregory Evans

More and more companies are offering services to test your DNA, allowing you to explore your genetic heritage. Eastern European? Chilean? Something super exotic that you never even considered as part of your ancestry? These tests can be spendy, though, so when someone offers you a special deal to do the testing for free, it sounds like a good deal. Scammers know this and have concocted a new scheme to steal your personal information.  

Our friends at the Federal Trade Commission (FTC) are receiving reports that callers, claiming to be from Medicare, are asking for personal information, such as Social Security or Medicare numbers, in exchange for a “free” DNA testing kit. The fraudster may make a convincing argument by claiming that the test is a “free way” to get an early diagnosis for diseases like cancer. However, the truth of the matter is that Medicare does not market DNA testing kits to the general public.  

Here are some tips on what you can do to avoid being a victim: 

  • If an alleged “government agency” demands personal information or payment, you can be sure it is a scam.  

  • Don’t rely on caller ID. Scammers can make it appear as if they were calling from a government-affiliated number.  

  • Never give anyone who randomly calls you information such as your bank account, credit card, Medicare or Social Security number. Scammers can use this information to either steal your identity and your money.  

  • You can report Medicare imposters at 1-800-MEDICARE and ftc.gov/complaint.  

As always, if you have been the victim of this online scam or any other cyber fraud, can also report it to the FBI’s Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.  

Source link

The post #cyberfraud | #cybercriminals | Cottage Grove Sentinel | Building a Digital Defense Against Medicare Scams appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | There’s A New Cyber Threat Targeting Netflix Users

Source: National Cyber Security – Produced By Gregory Evans

There’s a new phishing scam targeting Australian Netflix customers – and it’s incredibly easy to be fooled by it. The highly convincing email requests users to update their payment information via a link to an official looking website. Whatever you do, do not click that link. Here’s what you need to know.

Australian Netflix users have been hit by a fresh wave of phishing scams designed to steal your money. The email uses official branding and even uses the customer’s username – just like a real Netflix email. The supplied link also looks legit.

Despite being outed by the media last Friday, the scam is still reaching potential victims. I know this because my wife just received the below email:

“Sorry for the interruption, but we are having trouble authorising your Credit Card,” the email states. “Please visit www.netflix.com/youraccountpayment to enter your payment information again or to use a different payment method. When you have finished, we will try to verify your account again. If it still does not work, you will want to contact your credit card company.”

Clicking on the link takes you to a phishing site that looks just like the real Netflix site. Typing in your credit card details will result in currency theft and the locking of your Netflix account.

The only signs that something dodgy is afoot are the sender’s email address and the URL permalink (which is different to the supplied hyperlink.) While these red flags are obvious to tech-savvy users, I imagine there are many casuals out there who would fail to notice.

Needless to say, if you receive one of these emails you should delete it without clicking on any of the supplied links. You can read up on how to identify and avoid email scams here as well as in the video below.


10 Steps To Avoid Falling Victim To An Email Phishing Scam

One of the most popular ways for cybercriminals to steal personal information is by using email phishing scams. Cybercriminals often use this method of attack to trick employees from large organisations into clicking onto malicious links so they can gain access to corporate networks that contain valuable data. Here are 10 tips on how to avoid becoming a email phishing victim.

Read more

Source link

The post #cyberfraud | #cybercriminals | There’s A New Cyber Threat Targeting Netflix Users appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | What date do the sales start and how to find the best offers?

Source: National Cyber Security – Produced By Gregory Evans

Love it or hate it, there’s no denying the unstoppable force of Black Friday. What started off as a tradition across the pond has now become the highlight of every British bargain-hunter’s calendar. 

Whether you’re brave enough to flock to Oxford Street or prefer to shop online from the comfort of your own bed, there are serious savings to be had. Laptops, games consoles and clothes are all sold at a fraction of the price – perfect if you want to do some early Christmas shopping.

Because this event only comes around once a year, you need to be as prepared as possible – ideally, knowing exactly what you’re looking to buy. To help you prepare for your guilt-free shopping spree, therefore, we have created a guide of everything you need to know about Black Friday – including the start date, how to find the best deals, how to be safe when shopping online, and predictions of this year’s big-sellers.

What is Black Friday?

Black Friday is a tradition that originates from America, where retailers cut prices on a huge range of items the day after Thanksgiving. However, in recent years Britain has also jumped on the bandwagon.

As such, you can expect major UK retailers to cut prices on a large selection of items – including big-budget electrical items, beauty gift sets, kitchen equipment and clothes. 

Source link

The post #cyberfraud | #cybercriminals | What date do the sales start and how to find the best offers? appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | FBI gives tips on how to keep your information secure

Source: National Cyber Security – Produced By Gregory Evans

JACKSON, Tenn.– Internet-enabled theft, fraud and exploitation were responsible for $2.7 billion in losses in 2018. The victim could be anyone who uses a connected device, including you.

The Federal Bureau of Investigation says its Internet Crime Complaint Center took in a an average of 900 complaints every day last year, ranging from non-payment scams to pyramid schemes.

Jeremy Baker is one of the people investigating these crimes. To prevent them, he has some tips you can do right at home.

“Just like your personal hygiene, you want to shower every day, you want to bathe, want to smell good, your cyber hygiene is the same thing. Just be in good shape,” Assistant Special Agent-in-Charge Jeremy Baker told WBBJ 7 Eyewitness News.

The first thing he said was to have multi-layer authentication.

“If you log into your email and give your username and password, it won’t let you in just yet. It’ll do at least one other step like text you a code or email a different account a code and you put that in and go in,” he said.

To set that up, go to your email account, click security, and turn on the two-step verification.

Also, check your passwords.

“Think about somebody sitting in their mother’s basement all day trying to guess what your password is. Make it hard for that person to do it,” Baker said.

He said the passwords should be long and unpredictable.

“So, if I’m a Green Bay Packers fan, I shouldn’t make it ‘Green Bay Packers Fan,’” Baker said.

And if you post about the Packers all over social media, hackers might be able to use that.

“I’ve actually seen some huge cases where some industrious and creative criminals tracked executives on social media,” he said. “That is exactly how they got millions of dollars out of these large companies. Because they knew exactly what to say and when to say it and when to hit, based on the executive’s availability or lack-of availability.”

Keeping that safe is as easy as changing the privacy setting on social media from public to private.

But, most importantly, trust your gut. If you see a website or email that doesn’t look secure, don’t click or open it.

“Because those are actually the two biggest things we still see, even as complicated as technology gets, it’s usually caused by people opening or clicking things they shouldn’t,” Baker said.

And, the FBI says give the computer a break and turn it off. If the computer isn’t on, hackers can’t get into it.

“Make it hard for the bad guys to make you a victim,” he said.

Baker also offers a few other tips:

Use different computers for internet use and private use.

Install and keep up with anti-virus protection and software.

Keep your computer, tablet and phones up-to-date with the latest software, as the makers are constantly researching and updating.

And, back up your data.

Source link

The post #cyberfraud | #cybercriminals | FBI gives tips on how to keep your information secure appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Working with the young and young at heart

Source: National Cyber Security – Produced By Gregory Evans

Greetings from the fourth floor of your Missouri Capitol. As I write this, the forecast predicts we are getting ready to experience the first signs that winter may be on us sooner than we might like. However, we live in Missouri, and this should be of no surprise with the changing of the seasons.

This last two weeks have been busy in the district and beyond. I had the honor of being the host for the Silver Haired Legislature which met here at the Capitol for its annual session. They come here to discuss issues relevant to senior citizens and come with an agenda and legislation they would like to see implemented throughout the state. Like the General Assembly, they have representatives from all over the state and are elected to either the House of the Senate. While their procedures are different from the General Assembly, there are many similarities and protocols they follow. I commend them for taking the time to meet and have thoughtful discussion on issues that affect all seniors throughout the state.

Speaking of senior citizens, Attorney General Eric Schmitt hosted a senior safety meeting in Jefferson City where he outlined some dos and don’ts with regard to internet cyber-security, phone and mail scams, and other issues seniors face. This was the last of a number of presentations the attorney general has made throughout the state and gave those in attendance some great guidelines and advice to help them protect their life savings today and in the days to come. Seniors are a very vulnerable population to these scam artists, and as time passes, they have become more sophisticated in their approach. Everyone must be cautious in giving out personal information. While this presentation was targeted to the senior population, it contained great information no matter what age group you are in. For more information, I would encourage you to visit the AG’s website at ago.mo.gov, or if you receive suspicious calls, you can call their consumer protection hotline at 800-392-8222 for information on filing a complaint.

I had the honor of speaking to a group of business owners and leaders about legislation introduced this past session and plans for the upcoming session. I shared with them my experience in the private industry as well as the not-for-profit world and how I came to being a state representative. There were many thought provoking questions from the group, and it is always good to speak to my constituents concerning issues on their minds and what their state representative can do to help find answers. If your group would like me to make a presentation, please give my office a call.

Finally, I got to visit with the next generation of leaders in our community in the form of the Cedar Hill Elementary fourth-grade classes as well as Mr. Matheny’s third-grade class at Callaway Hills. The Cedar Hills students were on a tour of the Capitol, and at the end of their tour, I had the honor of having my picture taken with them on the grand staircase. This is always fun, and I love that they are learning about their state Capitol and all the history it holds and is right here in their hometown.

The Callaway Hills class invited me to speak with them during their government week, and they came with some great questions. I talked with them about the three branches of government and what role each plays with regard to legislation. We also discussed how each branch works together to do what is best for the residents of Missouri. They even came with prepared questions for me as well as a bill for their school that they would like to see implemented school wide, which could even possibly be something that could become law throughout the entire state. I am always encouraged that our youth are learning at an early age how our government works and how each one of them can be a part and make meaningful changes in the state where they live.

As always, it is an honor to serve as your state representative and if you have any questions or concerns please reach out to my office.

State Rep. Dave Griffith, R-Jefferson City, represents the 60th District, and shares his perspective on statehouse issues twice a month.

Source link

The post #cyberfraud | #cybercriminals | Working with the young and young at heart appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Insider Threats

Source: National Cyber Security – Produced By Gregory Evans Insider Threats Sunday, November 3, 2019 What’s an insider threat? Loosely, it’s a threat that operates from within your organization. In this CyberWire special edition, our UK correspondent Carole Theriault soeak with experts who’ll talk us through the different ways insider threats manifest themselves.  Transcript Dave […] View full post on AmIHackerProof.com

#cyberfraud | #cybercriminals | Payroll Fraud: A Growing BEC Threat to Businesses and Employees Alike

Source: National Cyber Security – Produced By Gregory Evans The FBI reports that direct deposit change requests increased more than815% in 1.5 years $8.3 million. This number represents the total reported losses due to payroll diversion schemes that were reported to the FBI’s Internet Crime Complaint Center (IC3) between Jan. 1, 2018 and June 30, […] View full post on AmIHackerProof.com

#cyberfraud | #cybercriminals | Alpharetta Warning Public About Online Dating Scams, Threats

Source: National Cyber Security – Produced By Gregory Evans

ALPHARETTA, GA — The City of Alpharetta is warning the public to be cautious when using online dating websites after a citizen was recently blackmailed.

The Alpharetta Department of Public Safety recently took a report from a citizen who was using a dating app and made a decision to send intimate pictures to the person they connected with, the city said.

“The victim has now paid thousands of dollars to the person to keep those pictures off social media channels,” the city said. “The perpetrator, in this case, has not gone away and continues to threaten and demand more money from the victim.”

Cyber dating and the apps that make it possible attracts millions of people. Many in search of companionship, many seeking long-term relationships, and many seeking to steal identities or worse, the city said. The world of online dating is fraught with top-of-mind risks (Is that photo really the person I’m talking to? Could this person be a predator?), but there is also a growing list of concerns related to data privacy.

“The fact is, dating sites and apps have a history of being hacked,” Alpharetta said. “For example, in 2018 BeautifulPeople.com was hacked and the responsible cyber criminals sold the data of 1.1 million users, including personal habits, weight, height, eye color, job, education and more, online. In early 2019 detailed user records of more than 42 million dating app users were found on a Chinese database that was not even protected by a password. The user records found on the data base contained everything from IP addresses and geo-locations to ages and usernames, giving potential hackers plenty of information to take advantage of.”

But, there are also many stories of people who found each other via online dating apps and are in very happy relationships today, Alpharetta wrote. So, the city said it does not want to scare any adult away from using them. The city said it wants everyone to be safe with their online dating activities.

With that in mind, here are a few tips that the city encourages all online daters to use:

Account Security

As with all of your Internet accounts, use a strong, unique password and two-factor authentication, if it’s available.

Beware of anyone sending you links, and especially links using shortened URLs. Hackers will try to lure you away from the dating app to sites that can more easily harvest your data. This is one of the most common Tinder scams. Rest your cursor over any link before you click it to see the address.

Only ever access your dating app on a secure WiFi network. An even better option is to protect the Internet connection of your dating app with a trustworthy VPN. This will add an extra layer of security to the app’s encryption.

Privacy And Social Engineering

Never share your full name, address, or place of work in your profile. Tinder, Bumble and Happn all allow users to add information about their job and education. With just this information and a first name, Kaspersky researchers were able to match a dating app profile to a LinkedIn or Facebook account 60 percent of the time.

Do not link your account on a dating app to your Facebook account. This makes it easier for hackers to connect your social media profile to your online dating one. It also would expose your data if Facebook were to suffer a data breach.

Using the same logic, do not link your Instagram, Twitter, or WhatsApp accounts to your dating app or share them in your profile.

For accounts or relationships based on your email, don’t use your everyday email address. Instead, get a separate, anonymous email just for that specific app or relationship.

Always disable any location-sharing features in your accounts on dating apps.

If you are uncomfortable sharing your cell phone number with someone you just met online, there are services that allow you to create a separate phone number. These services give you temporary phone numbers that last a couple of weeks for free or for a small fee. Since they are temporary, it is hard to use such a phone number on your dating app account, but it could give you some time to meet your matches in real life before you trust them with your phone number.

If an account looks suspicious, try doing a reverse image search of the profile pictures. If your search finds the photo is from a modeling agency or a foreign celebrity, you are likely looking at a fake account.

Eventually, you will have to share information about yourself. You are trying to convince someone that you are interesting enough to meet. Try to talk more about your interests, ambitions, and preferences and avoid specific information that could identify you. More “I love pizza” than “My favorite pizza restaurant is on the corner of Main St. and 2nd Ave.” Never be afraid to say “no” if someone asks you for personal information that you’re not yet comfortable sharing.

Avoid sending digital photos to users you do not trust. Digital photos can contain metadata about when and where the photo was taken along with other information that could be used to identify you. If you must share a photo, be sure to remove its metadata first. Also, always keep in mind that any explicit pictures you send could be used for blackmail.

If you are chatting with someone and they are responding incredibly fast or if their responses seem stilted and full of non-sequitur questions, you should proceed carefully. While it is possible you have enchanted someone so thoroughly that they are struggling to respond coherently, it is more likely you are chatting with a bot. Online bots are getting harder and harder to detect, but one test you can try is to work gibberish into a phrase, like “I love a;lkjasdllkjf,” and see if the bot repeats the non-word or transitions into a non-sequitur question. (If it’s a human, you can always cover by saying your phone slipped.)

This may seem obvious, but if someone asks you over a dating app to send them money, your answer should always be “No.”

Do not immediately friend your matches on Facebook. Once someone has access to your Facebook account, they can see your friend and family network along with your past activity and location. Wait until you have been dating for a month or two before friending them.

Physical Safety

Have a mutual understanding of boundaries. No matter what kind of date you have planned, it is always safer to know exactly what you’ll be doing. By discussing a plan beforehand, you can both go into the situation knowing what you are and aren’t comfortable with.

Meet in a public place first. No matter what kind of date you’re going on, it is always safer to meet in an open and public place first. Avoid meetings that take place in remote areas, vehicles or anywhere that makes you feel uncomfortable.

Always let someone know where you are. Before meeting up with someone, let a friend or family member know where you’ll be. Some apps let you share your location with others so that someone can keep an eye on you during your date.

Source link

The post #cyberfraud | #cybercriminals | Alpharetta Warning Public About Online Dating Scams, Threats appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Netflix email scam tells victims to ‘update your payment information’, news update

Source: National Cyber Security – Produced By Gregory Evans If you receive an email from Netflix telling you to update your payment information immediately, you could be the victim of sophisticated new scam. The streaming giant has once again been embroiled in a phishing email scam, which uses the same branding and username seen with […] View full post on AmIHackerProof.com