UCLA Student
Infosec Blog

debit card

wired.com

Attacks compromising business email are increasingly targeting nonprofits, bilking them for gift cards instead of complicated wire transfers. Criminal hackers make a lot of money targeting businesses and institutions of all kinds with phishing attacks that lead to compromised business email. While crooks may have an array of systems in place to launder the funds they steal, researchers have noticed that so-called business email compromise scammers are leaning more and more on the humble gift card.

Read More...

adidas gift card

aarp.org

When Denise McKendry entered the Kroger store in Midlothian, Va., on Feb. 25, the schoolteacher was visibly distraught. She was on her cellphone, talking to a man who had identified himself as Officer Johnson from the IRS. He had explained, in threatening and sometimes nasty terms, that McKendry owed $5,207 in back taxes and that she’d be arrested if she did not pay it off. Fortunately, thanks to an arrangement among Google, the IRS and her local police department, she could easily make a down payment on her debt and avoid jail. All she had to do was buy two $500 Google Play gift cards and read their code numbers to him over the phone.

Read more...

gift card

Gift Card 911. It’s an urgent request – get fifteen $150 gift cards and send the codes immediately!  Before rushing to comply, it’s important to slow down and carefully consider all the details.

Watch the video...

woman in front of computer

forbes.com

Watch out for any links texted to your Android phone promising an app to track coronavirus. Downloading the application will let snoops, suspected to be operating in Libya, watch you through your smartphone camera, listen to you through your microphone or pilfer all your text messages.

Read more...

gmail inbox

forbes.com

Cybercriminals and nation state-sponsored spies didn't take long to catch onto the coronavirus panic. Research released Thursday shows crooks and snoops have been rapidly registering vast numbers of potentially-malicious websites and sending out masses of scam emails as they try to make money from the pandemic.

A report from cybersecurity company Recorded Future noted a significant rise in website registrations related to the COVID-19 virus, some of which it believes are being used to either pilfer information from recipients or infect them with malware.

Read more...

report with graphs

threatpost.com

Denial of Service (DoS), ransomware, and financially-motivated data breaches were the winners in this year’s Verizon DBIR. Denial-of-service (DoS) attacks have spiked over the past year, while cyber-espionage campaigns have spiraled downwards. That’s according to Verizon’s 2020 Data Breach Investigations Report (DBIR) released Tuesday, which analyzed 32,002 security incidents and 3,950 data breaches across 16 industry verticals.

Read more...

ninjio graphic of man wearing a mask

Email Attachment Threats: Learn about how the COVID-19 map might be more than just a map.

Watch the video...

COVID-19 Map

entrepreneur.com

While people are focused on maintaining their physical and fiscal health, there's another threat they're likely not considering — a digital one. It should come as no surprise that cyber criminals are taking advantage of current events to profit, but companies and individuals need to do more to protect themselves. It's time to ramp up your cybersecurity efforts to protect your data and users.

The most common exploits against businesses are as follows:

  • Phishing with crisis-related content
  • Ecommerce fraud leveraging “in-demand” wholesale products
  • Pandemic-related phone scams

Read more...

Smiling woman on laptop

it.ucla.edu

CYBERSECURITY RESOURCES, BEST PRACTICES, AND ALERTS RELATING TO COVID-19

COVID-19 BRUIN RESOURCES & TOOLS AT ADMINVC WEBSITE

Although classes have temporarily transitioned to remote learning, campus remains open and research, health care, remote learning support and other business and operational support functions continue.

Read more...

ninjio radio host

ninjio.com

Transitioning to remote may be challenging and overwhelming in trying to establish security. Jon Lovitz, Jon calls in to talk to NINJIO Radio Host, Zack Schuler in a frenzy about working from home as a result of COVID-19. Zack walks Jon through the 5 Most Important Security Tips you should follow when working from home on your own devices.

Watch the video...