home title deed stolen

Is your home title already stolen?

Is your home title already stolen? How to Find out! Norris Fisher sold $4 million worth of property during his career… But, none of the sales he made were legal. He stole people’s property out from underneath them using forged documents and fake credentials. Here’s an example of the type of crimes Norris and his…

$100 Giveaway

Win $100 Giveaway!

Yes! That is right! We are giving away $100 Wal-Mart gift card! To enter for a chance to win, just click here! The $100 Winner will randomly be selected at the end of the month and notified promptly. Share the link with friends for chance of double entries to increase your chances to WIN! We…

Why Thieves are Targeting your Trash

Why Thieves are Targeting your Trash

A group of criminals in St. Tammany Parish, LA were arrested after they went dumpster diving. This criminal ring was targeting trash from a local loan business – one of those “cash now” places. The group rummaged through the trash to gather personal information about customers. They used this information to either steal existing credit…

Another Tax Season, More Scams

Another Tax Season, More Scams

It’s the start of tax season. This is the time of year when we collect our receipts and tax forms and hope for a nice big refund from the U.S. government. Unfortunately, cybercriminals are also looking for a nice big score as well. This year is going to be worse than ever, as many people…

LinkedIn data breach of 500m accounts

Data scraped from 500 million LinkedIn users found for sale online

IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks on LinkedIn and its users. A massive trove of LinkedIn account data has been found for sale online, containing 500 million user records including email addresses, phone numbers, links to…

stimulus coronavirus

Beware Of GetYourStimulusCheck.com And Other Coronavirus-Themed Domains

The likely victims, and what they can lose. With people losing jobs and businesses closing shop due to the coronavirus pandemic, the U.S. government has decided earlier this year to release financial aid. This assistance comes in the form of a US$2-trillion monetary stimulus package with the implementation of the Coronavirus Aid, Relief, and Economic…

Spoofing Tailored to Financial Departments

Spoofing Tailored to Financial Departments

Researchers at Area 1 Security have warned of a large spear phishing campaign targeting financial departments and C-suite employees with spoofed Microsoft 365 login pages. The researchers say that in some cases the attackers “specifically targeted newly-selected CEOs during critical transitionary periods.” Additionally, the attackers went after executives’ assistants. “Beyond financial departments, the attackers also…

Cybercrime Officially Has Its Own Global Ecosystem

Cybercrime Officially Has Its Own Global Ecosystem

Cybercrime Officially Has Its Own Global Ecosystem. From Services to Distribution, to Monetization, cybercriminals are getting so organized, cybersecurity experts are now beginning to see how vast the relationships to cybercrime and connections really are.

It’s worrisome when your organization comes under cyberattack in the first place.

How Does Ransomware Spread Globally? Through Malware.

How Does Ransomware Spread Globally? Through Malware.

Ransomware is a type of malware that involves encrypting a company’s or individual’s useful data or blocking users from accessing their computer systems in exchange for a given amount of money. Cybercriminals are always on the look-out for creatives means for getting a hold of your data so that they can have them at ransom.…

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem

While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to…

how to make sense of security: Ransomware: The Types of and How to Make Ransomware?

Ransomware: The Types of and How to Make Ransomware?

How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer or mobile device or by manipulating your files in such a way that you cannot access nor utilize them. Ransomware attacks have been on the rise in the recent past, which can be explained by…