CyberCrime Articles
Archives
Scammer (Claiming to be from Microsoft, Windows etc.) calling Richard Cunha, owner of COMPTU Computer Technical Support and Consulting, Richard decides to play along until another call comes in. COMPTU receives about 4 of these calls per month. Since the time of this video, Richard now gives the Gospel message to the caller. Some stay on the line wanting to hear more. Most hang up. You'd think they'd put the number on a do not call list.
Archived articles of which you need to be aware

Note from Richard Cunha of COMPTU (February, 2018, email to clients)
Note from Richard Cunha of COMPTU (March, 2018, phone safety tips))

________________________________________________
--------------------
--------------------
________________________________________________
- VORACLE Attack Can Recover HTTP Data From VPN Connections
- How Hackers Violate Your Privacy
- August 2018 Patch Tuesday: Microsoft fixes two actively exploited zero-days
- DDoS attackers increasingly strike outside of normal business hours
- New Office 365 phishing attack uses malicious links in SharePoint documents
- FBI Warns Of Pending Large Scale ATM Cashout Strike
- Faxploit: Hackers can use Fax machines to inject malware into a targeted network
- Intel’s SGX blown wide open by, you guessed it, a speculative execution attack
- Intel Reveals Three High Severity Memory Flaws
- Former Microsoft Engineer Gets 18 Months in Prison for Role in Ransomware Scheme
- Millions of Android Devices At Risk of Man-in-the-disk Attack
- Feds arrest three in global cybercrime ring linked to hacks on Chipotle, Arby's and other U.S. chains
- Two Canadian Banks Announce Hacks Over the Weekend
- The very latest in The Hacker News
- Spectre Meltdown
- Malware campaign expands to add cryptocurrency mining and iOS phishing attacks
- StalinLocker deletes data if you don't enter the right code in time
- Four-million Facebook users’ data wide open for anyone to download for years
- Google Maps flaw lets hackers redirect users to malicious sites
- 26% of Companies Ignore Security Bugs Because They Don’t Have the Time to Fix Them
- Zero-Day Attack Exploits Windows via Malicious Word Doc
- Windows critical flaw: This security bug is under attack right now, says Microsoft
- Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links
- Cost of cybercrime to exceed $2 trillion by 2019
- A Remote Hack Hijacks Android Phones Via Electric Leaks in Their Memory
- Hacktivists, Tech Giants Protest Georgia’s ‘Hack-Back’ Bill
- Millions of Home Fiber Routers Vulnerable to Complete Takeover
- Security News This Week: The Biggest DDoS for Hire Site Goes Down
- New Necurs variant uses internet shortcuts, Quant Loader to deliver payloads
- The firms that piggyback on ransomware attacks for profit
- Cheap crimeware kits help wannabe hackers get into the malware business
- EMEA Ransomware Attacks Soared Last Year
- North Korean Hackers Are up to No Good Again
- Hackers can exploit the vulnerability in iTunes’ Wi-Fi Sync feature and spy on iPhone users
- Beware of Bing Chrome Download Ads Pushing Adware/PUP Installers
- Orangeworm Jeopardizes Healthcare Data Security at Large Firms
- Millions of apps are exposing sensitive & unencrypted user data
- Ransomware, stolen data or malware: How do online crooks really make their money?
- 2018 Faces New Threats, But Same old Problems
- Minecraft malware: Malicious code in Minecraft skins has infected 50,000 accounts (and counting) with malware that wipes computer hard drives
- The White House Warns on Russian Router Hacking, But Muddles the Message
- New Email Campaign Employs Malicious URLs
- Seventy-one percent of IT security professionals in US federal agencies have reported breaches in their organizations.
- Accidental Insiders Pose a Serious Threat to Your Organization
- HIPAA Covered Entities Get Pass on OR Data Breach Notification Law
- Steps executives are taking to increase security while launching new ways to pay
- The Key to Understanding Facebook's Current Crisis
- Researchers Show How Popular Text Editors Can Be Attacked Via Third-Party Plugins
- Did you know that 84% of all cyber attacks target applications, not networks?
- Here's a List of 29 Different Types of USB Attacks
- Cybersecurity Expert: ‘Computers Are Hard to Break into, but People Are Easy’
- Improving Cybersecurity Response in Healthcare Organizations
- Microsoft Debuts Bug Bounty for Spectre/Meltdown-Style Flaws
- Email fraud warning: Now hackers want your data as well as your money
- Probes Begin as Facebook Slammed by Data Leak Blowback
- How AI Can Stop Ransomware, Detect Malware and Reduce Risk
- Alabama Data Breach Notification Act Accounts for Medical Data
- OceanLotus APT campaign debuts new backdoor that resembles old Korplug RAT
- Phantom Secure criminals indicted in global joint law enforcement 'smash'
- Russian hackers targeting energy grid, critical infrastructure
- Pentagon confirms hack attempt against Defense Department credit card holders
- Microsoft kicks off bounty program for speculative execution bugs
- Yahoo users can sue over data breaches, judge rules
- Researchers find security flaws in popular smart cameras
- Warning as Mac malware exploits climb 270%
- Sophisticated malware attacks through routers
- IoT Security Disconnect: As Attacks Spike, Device Patching Still Lags
- THE LEAKED NSA SPY TOOL THAT HACKED THE WORLD
- Google, PlayStation & NRA suffered DDoS attacks via Memcached servers
- Ukraine Sentences Two Citizens for DDoS Extortion Campaigns
- New Record 1.7Tbps DDoS Also Abused Memcached Servers
- 166 Applebee's Restaurants Hit With Payment Card Malware
- Weak Healthcare Cybersecurity Employee Training Affects IT Security
- New documents reveal FBI paid Geek Squad repair staff as informants
- Millions of Verizon customer records exposed in security lapse
- 7 Key Stats that Size Up the Cybercrime Deluge
- Healthcare Ransomware Attack Affects 6.5K at AL Practice
- 70K Notified in Tufts Health Plan Data Breach in Vendor Error
- Equifax Breach: Another Two Million Consumers Affected
- Chafer: Hacking group expands espionage operation with new attacks
- Sophisticated Android malware spies on smartphones users and runs up their phone bill too
- Cryptocurrency Theft: Hackers Repurpose Old Tricks
- Massive Malspam Campaign Targets Unpatched Systems
- U.S. cybersecurity threat risk remains high -- no signs of lessening
- New Mirai Variant Focuses on Turning IoT Devices into Proxy Servers
- US Spies: Russia Hacked Pyeongchang 2018
- Adobe Flash Vulnerability Reappears in Malicious Word Files
- Mobile banking Trojans spread confusion worldwide
- Adapting to the New Normal in Cybercrime
- How much does a data breach cost? Here's where the money goes.
- Word-based Malware Attack Doesn’t Use Macros
- Cybercrime Gang Ramps up Ransomware Campaign
- Hospital Data Breaches Most Common, Affect the Most Patients
- Ransomware: Why the crooks are ditching bitcoin and where they are going next
- Mac Malware Getting Serious - Security No Longer Optional
- Let your voices be heard. Updating or Downgrading Should Apple Give Back the Choice to Users?
- Rise of the 'Hivenet': Botnets That Think for Themselves
