Pipeline lead.png
Highest profile ransomware attack wh2.pn

With the cyberattack against Colonial Pipeline disrupting fuel supplies on the east coast, millions of Americans are experiencing ransomware for the first time. But ransomware attacks are not new or uncommon. In fact, ransomware is the fastest-growing kind of cybercrime because it can be so profitable for criminals.

 

In a ransomware attack, hackers gain access to an organization’s computer network, encrypt files on its computers, and demand payment to unscramble the files. Sometimes hackers also threaten to publicly disclose confidential information about organizations and individuals. The FBI warns that paying the ransom is usually futile.  

 

Employees can be unwitting accomplices to these hackers. Click on the button below to watch a video about how that happens.  

Credit scores and financial “risk factors” of millions of Americans have been exposed to fraudsters because of a glitch at the credit reporting giant Experian. Security expert Brian Krebs says freezing a person’s credit reports at Experian will prevent improper disclosure of their creditworthiness moving forward.  

> Only 4% of iPhone users are giving permission for Facebook, Google, and other platforms to track what they do on the web. Consumers got the option to opt-out of behavior tracking in Apple's latest software. Facebook implies that if too many consumers choose greater privacy, the company may have to charge users for its service. 

> Fake package delivery emails and texts are still on the rise because so many of us fall for them. Examples include:

  • “We have (1) package pending for your name. Schedule delivery now.”

  • “Order 4160894 is scheduled for delivery today. Track the package here.”

  • “Your misguided package is scheduled for delivery today. Click here for an ETA”.

The cyber firm Proofpoint says these emails contain links that require users to enter personal information to access phony delivery instructions.

Xtreme whblur.png

We view Aware Force from Xtreme Solutions as an extension of our commitment to keeping our clients informed and empowered.

 

Xtreme Solutions is powered by certified and highly experienced professionals in information technology, cybersecurity, and telecommunications services and solutions.

 

XSI's Cyber Range — I.C.E. (Integrated Cyber Environment) solution offers a virtual cyber defense environment designed to train cybersecurity professionals and decision-makers in securing national military and civilian networks against all forms of cyberattacks. The range is an integral component of Xtreme Solutions’ comprehensive cyber defense solutions.

 

Connect with us here

Hingram2.png

Hervia Ingram

Xtreme Solutions

Recent editions of Aware Force Cybersecurity News from Xtreme Solutions

One more thing.png
Answers to cybersafety questions.png

"I received email alerts saying each of the accounts at my credit union went below the minimum balance that I had set. If I log into the credit union, will that expose other accounts I have to hackers?"

If you think something is amiss, move fast. Log in, check your accounts, change your password, and call your financial institution if something is wrong. You’re smart to receive text alerts about the activity in your accounts. Now take it a step further. Set up two-stage authentication so, in addition to logging in with your password, you receive a one-time access code on your phone that must also be entered to gain access.

"If your e-mail, phone number, and password are on the dark web, what exactly does that mean? What are the consequences?"

Just assume your personal information is for sale on the dark web, the vast area of the internet not easily accessible with a web browser. There’s no way to undo that. Protect yourself by putting a freeze on your credit files at all three major bureaus (Equifax, TransUnion, and Experian), check the website haveibeenpwned.com to see if any of your accounts have been hacked, and create a new unique, long passphrase for each one.

"I fell for a phishing email because the "sender" email address was exactly that of a friend's. After I replied, the phishing email reply did NOT contain the previous "correct" email address, so I knew it was fraudulent. How does a person spoof the "sender" address when the email does not really come from that sender?"

Most of us don’t realize that our personal email is not very secure. Sometimes it can be intercepted. As you've learned, crooks can spoof an email address to make it appear to come from someone you trust. To check if an email has been spoofed, look at the address that appears between the < and >. (See the graphic below.) Whenever possible, consider sending important personal information via text message instead of email, or do a web search to learn how to encrypt emails in your home email program.

Email spoof example.png
Have a question about cybersafety? Let us know!

Thank you for your question!

Aware Force Cybersecurity News • May 2021 b • Edition #120

Cyber cartoon © 2021 cartooncollections.com

Aware Force A.gif

Original content © 2021 Aware Force LLC

Aware Force is a registered trademark