Telemarketing Fraudster Jailed for Ten Years

Telemarketing Fraudster Jailed for Ten Years

A business owner who extorted over $3.5m from Spanish-speaking US residents via fraudulent phone calls has been sentenced to more than 10 years in prison. California resident Angel Armando Adrianzen teamed up with a series of call centers in Peru to run a telemarketing scam that defrauded thousands of victims. Many of those conned by the 46-year-old owner and operator of AAD Learning Center (AAD) were recent immigrants to the United States.  Victims were contacted by callers…

Read More

Ransomware Gang Gifts Decryption Tool to HSE

Ransomware Gang Gifts Decryption Tool to HSE

A ransomware gang that launched a “catastrophic” cyber-attack against the Irish health system is now reportedly helping in its recovery.  The attack on the Health Service Executive (HSE) of the Republic of Ireland, carried out with Conti ransomware, started when a single computer stopped working and its user responded to a prompt to click on a link.  HSE was alerted to the attack at 4am on May 14 and subsequently shut down all of its IT systems…

Read More

Keep the Change: 3 Tips for Using the Twitter Tip Jar

Keep the Change: 3 Tips for Using the Twitter Tip Jar

When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter released their new Tip Jar feature, which allows users on the platform to send tips to designated accounts. However, online users and security experts are already exposing the vulnerabilities in its architecture.  Twitter’s Tip Jar has sparked concerns over user privacy due to the exposure of user’s shipping address, not to mention concerns over fraudulent payment disputes. Here’s what you need to know about this feature…

Read More

Keep the Change: 3 Tips for Using the Twitter Tip Jar | McAfee Blogs

Keep the Change: 3 Tips for Using the Twitter Tip Jar | McAfee Blogs

When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter released their new Tip Jar feature, which allows users on the platform to send tips to designated accounts. However, online users and security experts are already exposing the vulnerabilities in its architecture.  Twitter’s Tip Jar has sparked concerns over user privacy due to the exposure of user’s shipping address, not to mention concerns over fraudulent payment disputes. Here’s what you need to know about this feature…

Read More

Keep the Change: 3 Tips for Using the Twitter Tip Jar

Keep the Change: 3 Tips for Using the Twitter Tip Jar

When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter released their new Tip Jar feature, which allows users on the platform to send tips to designated accounts. However, online users and security experts are already exposing the vulnerabilities in its architecture.  Twitter’s Tip Jar has sparked concerns over user privacy due to the exposure of user’s shipping address, not to mention concerns over fraudulent payment disputes. Here’s what you need to know about this feature…

Read More

School safety experts release updated guidance on conducting armed assailant drills in schools

School safety experts release updated guidance on conducting armed assailant drills in schools

School safety experts release updated guidance on conducting armed assailant drills in schools | 2021-05-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Global CISOs Are Undermining Cyber-Hygiene Efforts

Global CISOs Are Undermining Cyber-Hygiene Efforts

Global cybersecurity leaders may not be practicing what they preach after new research revealed that many are engaging in risky behavior online. Constella Intelligence polled over 100 global IT security bosses across multiple verticals to compile its latest report, Cyber Risk in Today’s Hyperconnected World. It revealed widespread poor security practice: a quarter (24%) admitted to using the same passwords across work and personal use and nearly half (45%) connect to public Wi-Fi without using…

Read More

Global Credential Stuffing Hit 193 Billion Attempts in 2020

Global Credential Stuffing Hit 193 Billion Attempts in 2020

There were 193 billion credential stuffing attempts during 2020 as cyber-criminals looked to capitalize on surging numbers of online users, according to Akamai. The security vendor’s latest 2021 State of the Internet / Security report revealed the sheer scale of attempts to crack open users’ accounts using previously breached credentials. Focusing mainly on the financial sector, the report claimed that Akamai detected 3.4 billion credential stuffing attempts targeting the vertical — a 45% increase on…

Read More

Cloud misconfiguration exposes 100M+ Android Users

Cloud misconfiguration exposes 100M+ Android Users

Misconfiguration of back-end cloud services by more than 20 mobile app developers may have exposed the personal data of over 100 million Android users, according to researchers. A team at Check Point investigated 23 Android applications in a new piece of research, and found users’ emails, chat messages, location, passwords and photos all exposed by poor security practices. There were three main issues. First, misconfiguration of the real-time databases that developers use to store data…

Read More
1 2,330 2,331 2,332 2,333 2,334 2,645