Stories BBC:- Apple sues Israeli spyware firm NSO Group Link Apple is suing Israeli spyware firm NSO Group and its parent company for allegedly targeting iPhone users with a hacking tool. NSO's Pegasus software can infect both iPhones and Android devices, allowing operators to extract messages, photos, and emails, record calls, and secretly activate … Continue reading BBC:- Apple Versus NSO Group
Background This morning received an interesting email. Email Body Image Text Microsoft account un-usual sign-in activity. Microsoft account Unusual sign-in activity We detected something unusual about a recent sign-in to the Microsoft account email@example.com. Sign-in details Country/region: United States IP address: 184.108.40.206 Date: Sat, 13 Nov 2021 03:44:08 +0000 (GMT) Platform: Windows Browser: Microsoft Edge Please … Continue reading Email:- Microsoft account un-usual sign-in activity
Background Will like to touch on how to track login attempts to one's email account. Microsoft - Hotmail In this post, we will cover Microsoft's Hotmail. Activity Activity Log To access your Hotmail Account Activity Log, please follow the directions listed below. Launch a web browser Access Activity Log URL Enter this URL, https://account.live.com/Activity … Continue reading Microsoft – Hotmail – Security – Activity Log
Background One of the gentlemen that works in ministry with me recently had his email account hacked. Lineage Here are postings on this material :- Phishing – “How are you? I need a favor from you” Link Remediation Change Password One of the steps we took immediately is for him to change his current password. … Continue reading Email Filters – Yahoo Mail
Received this email Text How are you? I need a favor from you. I need to get a Gamestop Gift Card for my Nephew, Its his birthday but i can't do this now because I'm currently traveling.Can you get it from any store around you? I'll pay back as soon as i am back. Kindly … Continue reading Phishing – “How are you? I need a favor from you”.
Background I am a firm believer in glasnost. And, for that reason I choose not to talk much about security in the open space. But, in truth like a lot of things, conditions push us towards "closeness" ever so often. Definition Wikipedia Link Multi-factor authentication is a method of confirming a user's claimed identity in … Continue reading WordPress – Two-Factor Authentication
Background This morning received an obvious phishing email. Chose to play along and see if it is one already known to Google's Chrome. Evidence Gathering Email Email Folder - Junk Email Here is what the email looks like: Email Screen Email Text PауРаl PауРаl Hello,Аs раrt оf оur sесuritу mеаsurеs , wе rеgulаrlу sсrееn асtivitу … Continue reading Phishing Paypal :- chartersports.com
Technical: IT - Security - Ransomware - Cryptolocker Introduction Researching a different post and found some interesting posts by Hank Arnold @ Toolbox.com (http://windows.ittoolbox.com/blogs/) US local police department pays CryptoLocker ransom http://nakedsecurity.sophos.com/2013/11/19/us-local-police-department-pays-cryptolocker-ransom/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29 A local police department in Swansea, Massachusetts, has paid cybercrooks behind the CryptoLocker ransomware attack to decrypt files locked up by the malware … Continue reading Technical: IT – Security – Ransomware – Cryptolocker