Category:

Dunkin’ Donuts Hacked

The company was informed about the attack by one of its security vendors. Following the discovery of the attack, the firm enforced password resets to protect the DD Perks account holders’ accounts. Dunkin’ Donuts was hit by hackers recently . The fast food chain has notified its ‘DD Perks’ customers that hackers may have gained access to their account profiles and personal data last month. The unidentified hackers carried out a credential stuffing attack to obtain access to users’ account information. The company came to know about the attack from Continue Reading

Posted On :
Category:

Netflix users targeted in fresh scam looking for updated payment details

Bogus phishing email circulating since beginning of this week A scam targeting Netflix users has resurfaced with emails claiming to be from the streaming company asking for updated payment details circulating since the beginning of the week. The scam email uses fake Netflix branding to fool customers and is more plausible than many phishing scams as it replicates messages the company sends out when credit cards or debit cards used to pay the monthly fee have expired. The email attempts to redirect customers to a fake website dressed up to look like Continue Reading

Posted On :
Category:

FBI Releases Payroll Scam Protection Guidelines

The Federal Bureau of Investigation (FBI) has released a document describing the measures companies and their employees can take to avoid being the victims of payroll phishing scams. Phishing attacks are used by crooks to target random victims on the Internet with malware or specific targets of high interest such as financial department employees with access to money transfer operations. This type of security attack can be performed by bad actors either via e-mail messages containing malicious links or attachments or via maliciously crafted websites designed to pose as a trusted entity Continue Reading

Posted On :
Category:

What the new update to your Android phone is going to change

Google Assistant will soon be able to answer questions from the lock screen of Android smartphones. Today, Android phones can only respond to the “Hey Google” wake phrase when unlocked with a 4-digit pin or fingerprint scan. The update, one of many announced today being rolled out in the coming weeks, means Android phones will respond to queries like “Hey Google, what’s next on my calendar?” or “Hey Google, show me my unread emails.” Lock screen access will also be able to help schedule alarms or timers, create reminders, find information Continue Reading

Posted On :
Category:

People are being victimized by a terrifying new email scam where attackers claim they stole your password and hacked your webcam while you were watching porn — here’s how to protect yourself

Did you recently receive an email with one of your old passwords in the subject line and a request for bitcoin? It’s a new kind of scam. The attacker probably took your password from a publicly available database of old leaked passwords and email addresses. Here’s how to keep yourself safe. There’s a new scam going around that would terrify most people if it ever landed in their inbox. The emails are slightly different depending on who’s being attacked, but they all have a few similar features: The subject line includes Continue Reading

Posted On :
Category:

Hackers Laser-Target Arkansas Small Town With Ransomware

According to local news provider KARK, local businesses in Conway, Arkansas, have been hit with a ransomware attack. Some of the businesses have reportedly lost thousands of dollars. Companies impacted by the attack don’t want to go public, but KARK is reporting that multiple files have been encrypted by hackers who are demanding a ransom in exchange for the returned files. Meanwhile, Brian Fletcher, owner of Fixed by Fletcher, a local IT company, has been speaking out to try and help others prevent or recover from an attack. One of Fletcher’s customers, whom he declined to Continue Reading

Posted On :
Category:

Criminals are using social engineering on local businesses

We just got this pretty alarming message from the Hawaii State Procurement Office: The Judiciary has notified the State Procurement Office (SPO) regarding an unknown third party (Perpetrator) impersonating a government employee. The perpetrator is contacting vendors by phone or by email and is issuing fraudulent purchase orders, which appears as if signed by a government employee. On acceptance of the purchase order, the goods are sent to an unknown third party, typically a forward shipping company. Fortunately the vendor in this instance, determined the purchase order was fraudulent and Continue Reading

Posted On :
Category:

Coming Soon: Medical Device Cyber Attacks

The cybersecurity of connected medical devices – notoriously poor for decades – should finally start to improve. That is genuinely good news. But it is tempered by the reality that it will not happen quickly. The long-overdue change is coming thanks to the federal Food and Drug Administration’s (FDA) announcement in June that it was adopting UL 2900-2-1 as a new “consensus standard” for better software security in new devices, in order for them to qualify for “premarket certification.” That is expected to have a major impact – for good – on both the Continue Reading

Posted On :
Category:

Extensive personal data leaked about every American by a company you’ve never heard of

I’m not sure if you check the Dark Web as often as I do – you know, the black market of the Internet where rogue military groups, drug and human traffickers do all their business. Either way, I came across an interesting breach earlier this week from Exactis that is potentially the scariest I’ve seen. Exactis you ask? I hadn’t heard of them either. But they are just one of many data aggregation companies that create profiles about people based on their browsing patterns, social media, shopping and even driving patterns, Continue Reading

Posted On :
Category:

LIVE (replay) Hurricane Lane EMERGENCY Tech Session

 As you know hurricane Lane is coming fast. We did a special EMERGENCY community forum yesterday on how to make sure your business can continue to function when the hurricane hits and in case you missed it, here is the YouTube video replay. In the session we offer guidance on: * Managing power interruptions and surges * Managing internet & phone interruptions * Managing staff shortages, chain of command * Using tech to continue operating when facilities are damaged It’s our way of helping to educate and protect the community because we Continue Reading

Posted On :