Tag Archives: friends

Internet Crime and the Email Compromises – Be Aware – Beware! – For All

 

 

This is an article published by the Trustmark Bank America in their Security watch letter. 

For those who are not aware of how easy it is to be hacked or blackmailed read this and you will realize you need to be very cautious about what emails you open. I know I get emails from friends in my contact list  that have died. I get bogus emails with names of my friends or acquaintances as the sender. If that is the case I always, yes always check the email address before I open it.

So I suggest you read both these articles as they could save you a lot of money and inconvenience.

 

Security Letter – Trustmark – 07/31/2017

According to the FBI internet crime complaint center business email compromise (BEC) schemes have caused at least 5.3 billion in total losses over the past three years to approximately 24,000 organizations around the world. The average loss per victim is about $218,000. Companies of all sizes and types are targeted leaving long wake of financial and emotional damage

Scammers go to great lengths to research and target employees who work with company finances. They often send emails posing as the company CEO and instruct their target to make funds transfers. There are many versions to this scam, including sending a bogus invoice and compromising an employees email account to gain more information, which is why it is important to understand how BEC works and to know where your vulnerabilities lie.

As devastating as this crime is its equally easy to avoid being exploited.

  1. Carefully scrutinize all emails. Be wary of irregular emails sent by high-level executives. They can be used to trick employees into acting with urgency. Review and verify emails that request funds transfers.
  2. Raise employee awareness. Educate employees about cybercrime and how they can help protect the company. Review company policies and encourage employees to develop good security habits.

 

  1. Verify any changes in vendor payment location by using a secondary sign off by company personnel

 

  1. Stay updated on customer habits including the details and reasons behind payments.

 

  1. Verify requests. Confirm request for funds transfers by using phone verification as part of two-factor authentication. Use previously known phone numbers, not the phone numbers provided in the email.

 

  1. Report any incident immediately to law enforcement for file a complaint with the IC3.

 

A complete list of self protection strategies is available on the US department of justice website.

If you or your company have bee victimized by a BEC scam, its important to act quickly. Contact your financial institution immediately and request that they issue a swift recall of the transfer. For domestic transfers ask you financial institution to send a ‘hold harmless’ letter to the beneficiary bank. Always file a complaint with IC3 whether the attack has been successful or not.

 

Now this next article is a must read

 

Ransomware

Ransomware Is a type of malicious software (malware) that freezes your computer or mobile device until a sum of money is paid. It can destroy personal and business files leading to stolen data and large financial losses.

  • KNOW

Ransomeware attacks – especially those that target small businesses – are evolving a complexity and are on the rise.

All devices are vulnerable but more and more mobile attacks are being reported.

Criminals collected $209 million in the first quarter of 2016

$1 Billion + in losses is projected from ransomware attacks in 2016 alone according to the FBI

Ransom fees vary from $200 – $10,000

  • IDENTIFY

Ransomware targets a specific individual within a business, or a consumer with a link or attachment that infects the computer with malware or leads the individual to an infected website. Three ways ransomware can take shape are:

  1. Spear phishing emails.

The sender appears to be someone you may know or someone relevant to your business

The message is often personalized and may include your name as a reference to a recent transaction.

  1. Advertisements or pop-up windows.

Your computer freezes and a popup message appears.

The message may threaten a loss of your files or information, or may also tell you that your files have been encrypted

  1. Downloadable software

Ransomwae is also present in downloadable games and file sharing applications.

Once the PC is infected your files are encrypted and inaccessible. The fraudster demand a ransom payment in order to unlock them.

  • PREVENT

Always back up your files and save them offline or in the cloud.

Always use antivirus software and a firewall. Be sure they are set to update automatically.

Enable popup blockers

Don’t click. Be cautious when opening emails or attachments you don’t recognize – even if the message comes from someone in your contact list.

Only download software from sites you know and trust.

Alert your local law enforcement agency as soon as you encounter a potential attack

 

Advertisements

Leave a comment

Filed under Articles

Dear Friends

This is so cute.

Leave a comment

Filed under Articles

Did You Know – 10/05/2016

Screen Shot 2016-05-10 at 4.12.59 PM

1. 33% Of Partners prefer their pets company. The reason is they say their Furry friends are less argumentative.
Source – Real insurance Australian Pet Survey

2. Screen Shot 2016-05-10 at 2.22.15 PM

Screen Shot 2016-05-10 at 2.19.12 PM

3. Screen Shot 2016-05-10 at 2.26.14 PM

Screen Shot 2016-05-10 at 2.24.11 PM

Screen Shot 2016-05-10 at 2.50.41 PM

4. 11 body fluids we couldn’t live without. Saliva, Urine, sweat, Bile, Blood, menstrual Fluid, Mucus, Pus, semen, tears, Vomitus.

a. Bile – bile salts, which function like soap to break down dietary fats, enabling them and fat-soluble vitamins such as A, D and E to be absorbed. They also help to prevent the cholesterol-containing bile in the gallbladder from forming gallstones.
b. Blood – contains cell fragments called platelets and clotting factors that help to seal leaks that may develop in blood vessels.
c. Menstrual fluid – menstrual fluid is one of the body fluids with the strongest psychological and cultural overtones
d. Mucus – keeps the lining of the respiratory system from drying out and also filters out dust and infectious agents in the air we breathe.
e. Pus – Pus under the skin is often found in a pimple, but deeper in the body a larger collection is known as an abscess. Pimples and abscesses represent the body’s attempt to contain the spread of an infection
f. Semen – Contains fructose, a sugar that nourishes the sperm, as well as alkaline secretions that help to neutralize the normally acidic environment of the vagina.
g. Saliva – contains antibacterial enzymes and antibodies, as well as mucus itself. Saliva helps to moisten food, which is important to lubricate chewing and swallowing. It also enhances taste, because if the chemicals in food were not in a liquid medium, they could not be detected by taste receptors.
h.Sweat – Most important role is thermoregulation, helping to cool the body when it begins to overheat.
I.Tears – serve three functions: to lubricate the eye, to remove irritants such as smoke (and a sulfuric acid-producing chemical from cut onions) and in association with emotional states such as sorrow and joy.
J. Urine – Average adult produces about 1.5 liters of urine per day. Produced by the kidneys and stored by the bladder, urine contains many substances that must be removed from the body to maintain a state of health. These include the breakdown products of protein metabolism, which would become toxic if they were allowed to accumulate in the blood. Urine also serves as the principal means for removing excess salt and water from the body.
K. Vomitus – vomiting purges the body of toxins

source For in-depth details

5. Unknown.jpeg

The Loch Ness monster is protected by the 1912 Protection of Animals Acts of Scotland. With good reason – Nessie is worth $40 million annually to Scottish tourism.

Leave a comment

Filed under Articles

Friends For Ever

This is a cute Ad

Leave a comment

Filed under Articles

Look After Your Friends

Screen Shot 2015-08-06 at 4.22.33 PM

Leave a comment

Filed under Articles

Einstein’s PREDICTION!

Einstein’s spoken word my have come true

 

image001

Planning their honeymoon
image002
A day at the beach.
image003
Having dinner out with your friends.
image004
Out on an intimate date.
image005
Having a conversation with your BFF
image006
A visit to the museum
image007

Those are strong words but not too far from the truth. I am not sure about the word idiots but if you think about it those pictures depict a lack of awareness of the surroundings. I fear they allow, to pass, the beauty, the intimacy, maybe the love of their life, many opportunities because their eyes don’t see.

Leave a comment

Filed under Articles