I’ve said this many times before … the Internet is full of bad things. Of those bad things, one of the most common threats is Phishing attacks. Wiki defines phishing as “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication”. The majority of successful phishing attacks clone popular social networking sources and provide hyperlinks with the hope a target will click the link without questioning the authenticity of the source.
I wrote a post about what to look for regarding fraud email and craiglist sales HERE and 2 example craiglist cons HERE. The concepts are generally the same regarding identifying phishing attackers however in some cases, the attack will be a clone of a real message or website, which makes it very difficult to detect. Best practices is THINK BEFORE YOU CLICK! Here are some examples why this is important. Continue reading →
Pickpocketing is an old yet popular crime. Reason for this is the return can be as high as a robbing a store without the risk of using weapons or be identified by victims. Pickpockets can operate as a team or individually and typically involve a form of deception to conceal the crime. Most victims won’t realize they have been robbed until the pickpocket is long gone and if caught, the criminals face minimal jail time since lethal threats are not involved. Here is a review of the most common tactics used by pickpockets and methods to avoid becoming a victim. Continue reading →
My buddy Aamir wrote a great post on Cryptolocker. The original can be found HERE.
Cryptolocker is malware that is categorized as ransomware. According to Wikipedia, “Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed” (Wikpedia).
Cryptolocker is dangerous because if you are infected with the malware, you are in danger of losing all your files that are local to your machine, including attached storage (USB drives) and connected network drives. The network drives or any other mass storage media that shows up as a drive letter could be corrupted by the malware. Continue reading →
A coworker of mine, Tom Cross, was featured on CBS Atlanta regarding a case where a newscast member had her credit card information stolen. An interesting aspect of this situation is the criminals obtained the card number while the victim was in another city holding the authentic card. It is undetermined how the criminals stole the card number to create the duplicate but the motive clear … purchase giftcards until the credit card account becomes locked. Continue reading →
There are documentaries popping up that showcase outrageous claims such as the government hiding captured mermaids or encounters with aliens. I’ve heard friends and coworkers talk about such things around the water cooler believing the stories are real based on fake videos and actors posing as specialists. Movies like TheBlair Witch Project and The Forth Kind present fictional stories as documentaries, however most people figured out they are not real based on being available at major movie theaters. Some documentaries have been seen on TV networks displaying “A Speculative Documentary”, which doesn’t clearly translate to fictional footage. Continue reading →
I discovered a scam while researching methods to develop new ideas. Like many people, I have ideas but unsure how to make them real products. I found firms offering research, prototype development and marketing services for inventions. I decided to run a few ideas through the top advertised firm on Google known as Davison Design & Development. Continue reading →
A common saying is ” Amateurs Hack Systems, Professionals Hack People”. Social engineering is the art of manipulating people into performing actions or divulging confidential information. People fall for social engineering tricks based on their instinct to be helpful and trusting. The typical attacker never comes face-to-face with a victim using deception through email, social networks or over the phone. Continue reading →
A few months ago I posted about two craigslist scam attempts from adds I listed (go HERE to read). I recently had a few more craigslist scam attempts and noticed a pattern between the different methods to con me. Here are a few Red Flags for scams on craigslist or other merchant websites.
I personally had two craiglist scams attempted on me last week via a PayPal email scam and cashier’s check scam. The background story is I just purchased a new car (fist pump!) and attempted to sell my old car on craiglist. I posted it and received two fishy emails, which common sense screamed SCAM however I played things out for the sake of education and my blog readers.
Scam 1: I received an email asking about the car. After some basic emails the person said they will take it. I ask about seeing it and get back “I need a favor, I got a message from the pick up agent H/Q in the US that I need to pay a commission of about $900 before the pickup. It’s a private shipper agent, which can only take western union. All I need from you is to include fees and assure me that you can help me wire the agent. There isn’t any western unions around here or I would do it”. I say fine and the person asks for my paypal email. I tell him it’s my gmail and 30 minutes later I get the email below. His Canadian address made me laugh (not shown). Continue reading →