April is National Social Security Awareness month, and a good time to get up to speed on the latest scams targeting your Social Security number (SSN) and the resulting fraud that occurs. In 2019, government imposter scams were at an all-time high, with the majority of imposters pretending to be from the Social Security Administration (SSA). The new twist in 2020 comes as scammers capitalize on the coronavirus outbreak and the ongoing media coverage of COVID-19 and its impact on society and the economy.
As organizations move to remote work during the COVID-19 crisis, online communications have become essential. Online audio, web and video conferencing tool usage have increased 400% in only one month, according to AT&T. This new popularity for virtual meetings has also seen a multitude of security exploitations on popular video conferencing sites like Zoom.
On April 14, 2020, over 500,000 Zoom account credentials were found for sale on the Dark Web. The information available for purchase include the user’s email address, password, personal meeting URL, and their Zoom Host Key — all being sold for less than a penny each. In some cases, the account credentials were being offered for free. The account details were obtained through credential stuffing attacks, where cyberthieves use emails and passwords previously exposed in other, non-related data breaches, to attempt access into other sites.
*Originally posted January 14, 2019. Updated January 12, 2020.*
Fostering a Familial Digital Resilience
Our constant internet usage empowers cybercriminals to formulate countless methods for hijacking our personal information and then use it to commit identity theft and fraud. And, although different generations within a household may have different priorities online, all generations within the family are vulnerable.
The start of a New Year is a great time to emphasize the importance of safe online behavior for all those you care for and care about. Let’s review some safe practices that provide increased protection for keeping personal information secure. Continue reading
On January 2, 2020, dining and entertainment conglomerate, Landry’s, announced a point-of-sale malware attack that targeted customers’ payment card data – the company’s second data breach since 2015. Landry’s owns over 600 popular American restaurants across the U.S., including Del Frisco’s Grill, Joe’s Crab Shack, Bubba Gump, Rainforest Café and more; 63 of Landry’s restaurant brands were impacted by the malware. The number of customers affected by the breach has not been disclosed, but the malicious code is expected to have picked up payment details from credit and debit cards swiped on Landry’s order entry systems occurring between March 13 and October 17, 2019. The hacked Personally Identifiable Information (PII) included credit and debit card numbers, expiration dates, verification codes and cardholder names. Continue reading