Tag Archives: FBI

Internet Crime and the Email Compromises – Be Aware – Beware! – For All

 

 

This is an article published by the Trustmark Bank America in their Security watch letter. 

For those who are not aware of how easy it is to be hacked or blackmailed read this and you will realize you need to be very cautious about what emails you open. I know I get emails from friends in my contact list  that have died. I get bogus emails with names of my friends or acquaintances as the sender. If that is the case I always, yes always check the email address before I open it.

So I suggest you read both these articles as they could save you a lot of money and inconvenience.

 

Security Letter – Trustmark – 07/31/2017

According to the FBI internet crime complaint center business email compromise (BEC) schemes have caused at least 5.3 billion in total losses over the past three years to approximately 24,000 organizations around the world. The average loss per victim is about $218,000. Companies of all sizes and types are targeted leaving long wake of financial and emotional damage

Scammers go to great lengths to research and target employees who work with company finances. They often send emails posing as the company CEO and instruct their target to make funds transfers. There are many versions to this scam, including sending a bogus invoice and compromising an employees email account to gain more information, which is why it is important to understand how BEC works and to know where your vulnerabilities lie.

As devastating as this crime is its equally easy to avoid being exploited.

  1. Carefully scrutinize all emails. Be wary of irregular emails sent by high-level executives. They can be used to trick employees into acting with urgency. Review and verify emails that request funds transfers.
  2. Raise employee awareness. Educate employees about cybercrime and how they can help protect the company. Review company policies and encourage employees to develop good security habits.

 

  1. Verify any changes in vendor payment location by using a secondary sign off by company personnel

 

  1. Stay updated on customer habits including the details and reasons behind payments.

 

  1. Verify requests. Confirm request for funds transfers by using phone verification as part of two-factor authentication. Use previously known phone numbers, not the phone numbers provided in the email.

 

  1. Report any incident immediately to law enforcement for file a complaint with the IC3.

 

A complete list of self protection strategies is available on the US department of justice website.

If you or your company have bee victimized by a BEC scam, its important to act quickly. Contact your financial institution immediately and request that they issue a swift recall of the transfer. For domestic transfers ask you financial institution to send a ‘hold harmless’ letter to the beneficiary bank. Always file a complaint with IC3 whether the attack has been successful or not.

 

Now this next article is a must read

 

Ransomware

Ransomware Is a type of malicious software (malware) that freezes your computer or mobile device until a sum of money is paid. It can destroy personal and business files leading to stolen data and large financial losses.

  • KNOW

Ransomeware attacks – especially those that target small businesses – are evolving a complexity and are on the rise.

All devices are vulnerable but more and more mobile attacks are being reported.

Criminals collected $209 million in the first quarter of 2016

$1 Billion + in losses is projected from ransomware attacks in 2016 alone according to the FBI

Ransom fees vary from $200 – $10,000

  • IDENTIFY

Ransomware targets a specific individual within a business, or a consumer with a link or attachment that infects the computer with malware or leads the individual to an infected website. Three ways ransomware can take shape are:

  1. Spear phishing emails.

The sender appears to be someone you may know or someone relevant to your business

The message is often personalized and may include your name as a reference to a recent transaction.

  1. Advertisements or pop-up windows.

Your computer freezes and a popup message appears.

The message may threaten a loss of your files or information, or may also tell you that your files have been encrypted

  1. Downloadable software

Ransomwae is also present in downloadable games and file sharing applications.

Once the PC is infected your files are encrypted and inaccessible. The fraudster demand a ransom payment in order to unlock them.

  • PREVENT

Always back up your files and save them offline or in the cloud.

Always use antivirus software and a firewall. Be sure they are set to update automatically.

Enable popup blockers

Don’t click. Be cautious when opening emails or attachments you don’t recognize – even if the message comes from someone in your contact list.

Only download software from sites you know and trust.

Alert your local law enforcement agency as soon as you encounter a potential attack

 

Advertisements

Leave a comment

Filed under Articles

Did You Know – 10/31/2016

1.1383610353000-terms-and-conditions-still-3

It would take you 76 full workdays to read all the privacy policies and terms and conditions you agree to in a year

2.
81ur2eogv3l-_sl1500_

Study shows purified water is a detriment to the health of our body. Purified water is produced by deionization, distillation or reverse osmosis. It acidifies the body and leaches minerals and because of the sarge size and shape of its water molecule clusters it does to hydrate the body efficiently. Purified water should be used in humidifiers, fountains autoclaves and fish tanks. but not consumed by humans.

Source: The miraculous properties of ionized water

If you want to learn about Ionized water and the water filter – Click here

 

3.image

London Still pays  rent to the Queen on a property it leased in the 11th century. Every year a ceremony is held at the Royal courts of Justice and the city hands over its annual rent:- A Knife, An Axe, 6 horseshoes, and 61 nails  to Barbara Janet Fontaine, the Queen’s Remembrancer, the oldest judicial position in England. The job was created in the 12th century to keep track of all that was owed to the crown.

No one knows exactly where these two pieces of land are located anymore, but for hundreds of years the city has been paying rent on them. The rate, however, has not changed—the same objects have been presented for hundreds of years.

Source

I love the traditions of England. Like no other country upholds its history like the UK.

 

4.screen-shot-2016-10-31-at-1-29-22-pm

 This striking volcanic plume Shiprock was formed around 30 million years ago, developing as a plug within the vent of an active volcano. Over time, the rest of the volcano eroded away, leaving the  jagged outcrop all alone in a vast expanse of plain. At over 1500 feet, it’s the tallest structure for miles and miles.

The structure is an epicenter of legend within the Navajo culture. “the rock with wings,” myth says that the Shiprock was a piece of land that became a bird, carrying the ancestral people of the Navajo on its back. At sundown, the enormous creature settled in its current desert location and promptly turned back to stone

Although the steep, perilous sides of the Shiprock were once considered a great prize among rock climbers, human ascents have been expressly off-limits since 1970, in accordance with Navajo custom.

 

5. screen-shot-2016-10-31-at-1-40-27-pm

There is a bike lock that is designed to make would be thieves sick. When someone cuts 30% of the way into a Skunklock, it releases a pressurized gas that immediately induces vomiting and causes difficulty breathing, symptoms similar to the effects of a pepper spray. Great for bicycles and motorbikes.

 

6. webcam-with-tape2-470x236

FBI Director James Comey admitted to covering his PC Webcam with tape. He also recommended that everyone do the same to protect their privacy saying “There are some sensible things you ought to do and that is one of them”

If you saw the movie “Snowden” you would not hesitate. (click on Snowden to watch trailer)

Leave a comment

Filed under Articles