Advertisements

Hackers

  • November 25, 2016

    Do You Use Credit Cards?

    Do you use credit cards? Hackers all over the world are after your money! This is what you can do to make sure your money and you are safe: A credit card is a standout amongst the most well-known and broadly utilized budgetary items. Serving as a technique for installment, it permits its holder to buy products and services on the guarantee of paying the sum within a stipulated time. Typically issued with a revolving credit, these cards are advantageous, since they are efficient and make for snappy and hassle-free purchases. With cashless exchanges and a variety of alluring advantages like discounts and gift vouchers that accompany expanded use and convenient installments, these cards are convenient to use and easy. However, considering the ease of these transactions, these cards are also quite susceptible to misuse and fraud. There are various ways of ensuring the safety of your finances, especially as far as your credit card is concerned. Here a few tips for your perusal: Make sure you check before you sign the card receipt Swiping your credit card is definitely one of the easiest ways to make a purchase. However, you should always take a minute to check the receipt before you sign and authorize the payment. Make sure that the amount printed on the receipt matches the value of the transaction. Additionally, you should also check for blank spaces on the receipt that can be subsequently filled in by the merchant. In case there is a space, you can fill it in with Rs. 0 in to prevent misuse of your receipt and to avoid receiving bills for transactions you have not made. There have been cases where the blank spaces have been filled in with random amounts that have had to be paid by the issuer. Avoid giving...
  • Michaels Companies Inc, the biggest U.S. arts and crafts retailer with over 1259 is investigating a possible security breach on its payment card network and advised customers to check their financial statements for fraudulent activity. This is not the first time the company has faced a data breach. In 2011, about 94,000 payment card numbers were stolen from approximately 80 stores hackers replaced some 84 PIN pads on payment-card terminals at a small number of Michaels stores that resulted in the breach. Michaels is the third major targeted retailer in the past month to be hit with credit card type data breach. Michaels said federal investigators and an outside forensics firm were investigating to determine if there had been a breach. The company said it decided to warn the public and launch a probe into the matter after hearing that there had been an increase in fraud involving cards of customers who had shopped at its stores. In a statement Michaels CEO Chuck Rubin stated “We are concerned there may have been a data security attack on Michaels that may have affected our customers’ payment card information and we are taking aggressive action to determine the nature and scope of the issue.” The U.S. Federal Bureau of Investigation last week warned retailers to expect more attacks and said the agency has reviewed 20 incidents over the past year that were similar to the recent breaches.
  • U.S. intelligence agencies traced a recent cyber intrusion into U.S. Army database that holds sensitive information about vulnerabilities in U.S. dams.   The U.S. Army Corps of Engineers National Inventory of Dams contains information about 79,000 dams throughout the country and tracks such information as the number of estimated deaths that could occur if a specific dam failed.   The database also holds sensitive information, including vulnerabilities, of every major dam throughout the country. Michelle Van Cleave, a former consultant to the CIA, told the Beacon that the data breach appeared to be part of a greater effort to collect vulnerability and targeting data for future cyber or military attacks.   The Corps of Engineers National Inventory of Dams was hacked by an unauthorized user believed to be from Chinese government or military cyber warriors, beginning in January and uncovered earlier this month.   “In the wrong hands, the Army Corps of Engineers’ database could be a cyber attack roadmap for a hostile state or terrorist group to disrupt power grids or target dams in this country,” Van Cleave said.   All users had been sent an e-mail notification to this effect, which apparently told them that their account username had been changed to their e-mail address and included the new password in plaintext that the Corps did not ask users to change.   According to the Corps website, the dam inventory was created under a 1972 law and was updated in 1986 to require coordination between the Corps and the Federal Emergency Management Agency   Read Full Article  
  • Mitt Romney’s tax returns are reportedly in the hands of a team of hackers who plan on releasing them publicly on Sept. 28 unless a $1 million ransom is paid in Bitcoins. The group allegedly obtained the files from PricewaterhouseCooper’s Tennessee office on Aug. 25, in what was described on the groups PasteBin post: Romney’s 1040 tax returns were taken from the PWC office 8/25/2012 by gaining access to the third floor via a gentleman working on the 3rd floor of the building. Once on the 3rd floor, the team moved down the stairs to the 2nd floor and setup shop in an empty office room. During the night, suite 260 was entered, and all available 1040 tax forms for Romney were copied. A package was sent to the PWC on suite 260 with a flash drive containing a copy of the 1040 files, plus copies were sent to the Democratic office in the county and copies were sent to the GOP office in the county at the beginning of the week also containing flash drives with copies of Romney’s tax returns before 2010. A scanned signature image for Mitt Romney from the 1040 forms were scanned and included with the packages, taken from earlier 1040 tax forms gathered and stored on the flash drives. A recent PasteBin document from the group stated the following: “The keys to unlock the data will be purged and whatever is inside the documents will remain a secret forever.  Failure to do this before September 28, the entire world will be allowed to view the documents with a publicly released key to unlock everything. And the same time, the other interested parties will be allowed to compete with you.” From what I have read Mitt Romney is not concerned with the threat he says...