Posted on 3 Comments

Beware of Sextortion and Romance Scams

external content.duckduckgo 26

the staff of the Ridgewood blog

Ridgewood  NJ, over the last several years, the NJCCIC reported on sextortion scams in which victims were threatened with the release of compromising or sexually explicit photos or videos of the victim if an extortion payment was not made. Threat actors may use social engineering tactics to lure their victims via email, text message, or direct messages on social media or dating apps, and they may pose as potential love interests to build trust, communicate their story, and profess their love in an attempt to convince their victims to divulge information or send money. Other campaigns included claims that the threat actors successfully compromised the victim’s computer or mobile device and were able to take compromising screenshots or recordings of the victim that were sexually explicit in nature, further threatening to release them if an extortion payment was not made. These campaigns may appear convincing, but these threats were not credible as threat actors were unable to provide proof of the compromised photos or videos.

Continue reading Beware of Sextortion and Romance Scams

Posted on Leave a comment

UPDATE : The Surveillance State: The Nefarious Use of Bluetooth Tracking Devices

bluetoothtracker 2048px 3233 2x1 1

Image Source: New York Times

the staff of the Ridgewood blog

Ridgewood NJ, a swimsuit model says she was stalked by a stranger who slipped an Apple AirTag tracker into her coat pocket before following her for five hours.

Brooks Nader, 26, claims the disturbing incident occurred Wednesday night while she was out in New York City, and she only realized it when her iPhone alerted her to the fact that an “unknown accessory” was moving with her.

it is inevitable that items—such as keys, wallets, purses, and bags—may be lost or misplaced. To help prevent this, users can attach tracking devices to everyday items and connect them to a smart device via Bluetooth. Then, if items are lost or misplaced, users can use an app to search for them and determine their location with impressive accuracy. If the tracking devices are within Bluetooth range, the app can easily trigger an audible alert to help locate them. If the tracking devices are not within range, the app leverages nearby smart devices to transmit their location and send alert notifications to the owner and/or finder. There are multiple Bluetooth tracking devices to choose from, such as Apple AirTags and Tile tracker tags. Although their use can be a positive, legitimate, and convenient way to keep track of items, tracking devices have the potential for intentional misuse and abuse. We explore how perpetrators may use these tracking devices for nefarious purposes—committing malicious cyber activity, impacting personal safety, and enabling auto theft.

Continue reading UPDATE : The Surveillance State: The Nefarious Use of Bluetooth Tracking Devices

Posted on 3 Comments

Who is Spying On You?

external content.duckduckgo 45

the staff of the Ridgewood blog

What is Spyware?

Spyware refers to malicious software often used to monitor, capture, and share detail information from computers, phones, or other devices. It can collect emails, social media posts, call logs, messages on encrypted chat apps, contacts, usernames and passwords, notes, and documents such as photos, videos, and audio recordings. It can also collect GPS information to determine a user’s location, movement, and direction. Some spyware can also activate microphones and cameras as well as deliver files without any indicators or notifications to users. Spyware can be simple or sophisticated and rely on security weaknesses or unpatched software vulnerabilities. Although device and file encryption are recommended, it cannot assist in preventing spyware activity because once the encrypted message is delivered to the device, it is decrypted and made readable by both the user and the spyware.

Continue reading Who is Spying On You?

Posted on Leave a comment

Local Police Warn of Motor Vehicle Commission Phishing Scam

unnamed 1

 

the staff of the Ridgewood blog

Ridgewood NJ, local Police are warning people about possible identity thieves sending text messages posing as the state Motor Vehicle Commission in a phishing scam.

Continue reading Local Police Warn of Motor Vehicle Commission Phishing Scam

Posted on Leave a comment

Cyber Risks Associated with Traveling

external content.duckduckgo 19

the staff of the Ridgewood blog

Ridgewood NJ, many people travel for business or leisure purposes year-round to local destinations or around the globe. As people travel and access public networks, they are exposed to various cyber risks. The NJCCIC reminds users to be aware of the cyber risks associated with traveling and to employ best practices to stay safe while they are away. Users are encouraged to review the recommendations for the security of devices, accounts, networks, vehicles, and international travel.

Continue reading Cyber Risks Associated with Traveling

Posted on Leave a comment

Time to Update those Passwords

password infographic

the staff of the Ridgewood blog, we know we are a day late !

Ridgewood NJ, The first Thursday in May is World Password Day, which was originally created by Intel in 2013 as a global effort to address the critical need for strong, unique passwords and emphasize the importance of this first line of defense in securing information, networks, servers, devices, accounts, databases, files, and more against cyberattacks. This day also serves as a reminder to update and organize all recent passwords. Now more than ever before, many users are connected to the internet and access multiple accounts and services for business, including email, applications, and vendor websites. Users also have access to multiple personal accounts, such as email, social media, online banking, bill payment, utilities, healthcare, shopping, entertainment, food delivery, dating apps, and more. The increased use of online accounts and services, combined with users engaging in risky password management practices, puts both themselves and employers at risk of account compromise and data breaches. Therefore, it is important to practice good password hygiene to protect accounts and data, not just on World Password Day, but year-round.

Continue reading Time to Update those Passwords