Wednesday, July 8

Identity Theft

Everything You Wanted to Know About Sex But Were Afraid to Ask
Addiction, Children Teens, Free, Identity Theft, Parents Family, Rehab, Reviews, Safety Security, Senior Aging, Sex Porn, Social Media, Tools Apps Software, Treatment

Everything You Wanted to Know About Sex But Were Afraid to Ask

Robert Weiss, renowned expert on sex, relationships, infidelity, sexual addiction and other intimacy-related issues, will host a Reddit AMA (Ask Me Anything) session Tuesday, July 19th at 10 am Pacific. As the “AMA” label suggests, Rob will answer any and all questions. Nothing is off limits.For instance, anyone who has ever wondered what sex addiction is, what it looks like, how it manifests and how it’s treated, now has a great opportunity to ask the guy who literally wrote the book on this subject whatever it is they’d like to know, including: How do I know if I’m a sex addict? What does “sexual sobriety” look like? Should my mate give me a free pass on cheating if I’m sexually addicted?This is also a great chance to talk about infidelity. If you’ve cheated and feel badly about it, or y...
Why Past Life Regression Therapy Works for Treating Anxiety
Addiction, Free, Identity Theft, Rehab, Reviews, Safety Security, Tools Apps Software, Treatment

Why Past Life Regression Therapy Works for Treating Anxiety

Past life regression therapy has generated much debate and controversy within the mental health care profession. Perhaps because it seems to take the existence of reincarnation for granted.In psychology, it is standard practice to search for the roots of past unresolved conflicts and emotional health problems, within the deep well of hidden or suppressed memory. But past life regression therapy takes this approach to a whole new level, abandoning the usual limits of time, space and identity in a wide-ranging search for the true sources of present-day suffering.Skeptics dismiss past life regression therapy as pure fantasy, but hypnotherapists who practice it refuse to dismiss this possibility. They swear that past life regression therapy has the capacity to positively impact the lives of th...
FEMA IT Specialist Charged in ID Theft, Tax Refund Fraud Conspiracy
Breach Hack, Cyber Crime, Cyber Security, Free, Identity Theft, Resources, Safety Security, Scams Fraud, Tools Apps Software

FEMA IT Specialist Charged in ID Theft, Tax Refund Fraud Conspiracy

An information technology specialist at the Federal Emergency Management Agency (FEMA) was arrested this week on suspicion of hacking into the human resource databases of University of Pittsburgh Medical Center (UPMC) in 2014, stealing personal data on more than 65,000 UPMC employees, and selling the data on the dark web. On June 16, authorities in Michigan arrested 29-year-old Justin Sean Johnson in connection with a 43-count indictment on charges of conspiracy, wire fraud and aggravated identity theft. Federal prosecutors in Pittsburgh allege that in 2013 and 2014 Johnson hacked into the Oracle PeopleSoft databases for UPMC, a $21 billion nonprofit health enterprise that includes more than 40 hospitals. According to the indictment, Johnson stole employee information on all 65...
Russian Cybercrime Boss Burkov Gets 9 Years
Breach Hack, Cyber Crime, Cyber Security, Identity Theft, Malware Ransomware, Safety Security, Scams Fraud

Russian Cybercrime Boss Burkov Gets 9 Years

A well-connected Russian hacker once described as “an asset of supreme importance” to Moscow was sentenced on Friday to nine years in a U.S. prison after pleading guilty to running a site that sold stolen payment card data, and to administering a highly secretive crime forum that counted among its members some of the most elite Russian cybercrooks. Alexei Burkov, seated second from right, attends a hearing in Jerusalem in 2015. Photo: Andrei Shirokov / Tass via Getty Images. Aleksei Burkov of St. Petersburg, Russia admitted to running CardPlanet, a site that sold more than 150,000 stolen credit card accounts, and to being a founder of DirectConnection — a closely guarded underground community that attracted some of the world’s most-wanted Russian hackers. As KrebsOnSecurity not...
4 Steps to a More Mature Identity Program
Cyber Security, Free, How-to Tips, Identity Theft, Resources, Safety Security, Virus

4 Steps to a More Mature Identity Program

Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.Certain junctures in history have created unintended dichotomies: haves and have nots, protected and unprotected. In cybersecurity, COVID-19 has shown us whether an enterprise is well ahead of the digital transformation curve or woefully behind. Those who've transformed have also embraced a security approach that de-emphasizes perimeter defense and instead elevates identity. Many organizations have rushed to provision IT services such as a virtual private network or other access controls to enable a virtual workforce, but identity is much more than merely providing access gateways to resources. Access without oversight merely increases the attack surface for an enterprise. Using...
COVID-19: Latest Security News & Commentary
Addiction, Breach Hack, Children Teens, Cyber Crime, Cyber Security, Free, Games, Guide, How-to Tips, Identity Theft, Malware Ransomware, Parents Family, Phsihing Spam, Privacy Data Protection, Resources, Safety Security, Scams Fraud, Senior Aging, Social Media, Tools Apps Software, Virus

COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. ') } else document.write('') Image Source: CDC Newsroom Image library 07/01/2020Another COVID-19 Side Effect: Rising Nation-State Cyber ActivityWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs. 06/30/2020COVID-19 Puts ICS Security Initiatives 'On Pause'Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk. CISA Issues Advisory on Home RoutersThe increase in work-from-home employees raises the importance of home router security. Profile of the Po...
Anatomy of a Long-Con Phish
Addiction, Children Teens, Cyber Security, Free, Identity Theft, Malware Ransomware, Parents Family, Phsihing Spam, Resources, Safety Security, Scams Fraud, Senior Aging, Social Media

Anatomy of a Long-Con Phish

A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.Phishing is one of the oldest fraud techniques online. Phishers often utilize a spray-and-pray method to hit as many potential victims as possible. The aim of such an attack is quick profit via the harvesting of user login or banking credentials. Once the victim surrenders his/her valuable information, the phisher moves on, either to the next victim or a different campaign altogether. But some phishing attacks are entirely different. For the lack of a better term, I call them "long-con phishing." I was on the receiving end of one such phishing scam recently. In March, I received this LinkedIn message: ') } else document.write('') Even...
Google joins Apple in limiting web certificates to one year
Breach Hack, Cyber Security, Free, Identity Theft, Parents Family, Safety Security, Scams Fraud, Tools Apps Software

Google joins Apple in limiting web certificates to one year

Our chums over at online IT publication The Register just spotted an interesting code change in the Chromium browser from last week. Google, it seems, is joining Apple in limiting the maximum validity of web security certificates – those digitally signed blobs of data that put the S in TLS and the padlock in your address bar – to just one year. The code change is headlined Enforce 398-day validity for certificates issued on-or-after 2020-09-01, and it looks like this: Enforce publicly trusted TLS server certificates have a lifetime of 398 days or less, if they are issued on or after 2020-09-01. Certificates that violate this will be rejected with ERR_CERT_VALIDITY_TOO_LONG and will be treated as misissued. Apple announced back in February 2020 that it was going to start doing this i...
Aussie surfer’s hacked Instagram sent sexually explicit images to her 40,000 followers
Addiction, Breach Hack, Children Teens, Cyber Security, Free, How-to Tips, Identity Theft, Malware Ransomware, Parents Family, Phsihing Spam, Safety Security, Scams Fraud, Senior Aging, Sex Porn, Social Media

Aussie surfer’s hacked Instagram sent sexually explicit images to her 40,000 followers

18-year-old Blaze Angel Roberts is a talented surfer.So good in fact that the Sydney-based surfing star has managed to collect 40,000 followers on her Instagram account.Unfortunately, her popularity also seems to have drawn the unwanted attention of hackers, who successfully tricked her into clicking on a phishing link, and handing over the password to her email account.Roberts told Nine Network’s “A Current Affair” TV show that the hackers used the compromised email account as a springboard to hijack her Instagram account: When Ms Roberts regained access to her email, she found photos of the hackers in her sent messages.When an account has been hacked, Instagram asks users to verify their identity by sending their security team a photo of themselves holding a piece of paper with a handwri...
US Cyber Command says foreign hackers will attempt to exploit new PAN-OS security bug
Breach Hack, Cyber Security, Identity Theft, Safety Security

US Cyber Command says foreign hackers will attempt to exploit new PAN-OS security bug

US Cyber Command said today that foreign state-sponsored hacking groups are likely to exploit a major security bug disclosed today in PAN-OS, the operating system running on firewalls and enterprise VPN appliances from Palo Alto Networks. "Please patch all devices affected by CVE-2020-2021 immediately, especially if SAML is in use," US Cyber Command said in a tweet today. "Foreign APTs will likely attempt [to] exploit soon," the agency added, referring to APT (advanced persistent threat), a term used by the cyber-security industry to describe nation-state hacker groups. CVE-2020-2021 - a rare 10/10 vulnerability US Cyber Command officials are right to be panicked. The CVE-202...