What Are Recovery Scams?

If you think you’ve been scammed, it’s natural to want to ask for help or just vent on social media. Unfortunately, doing so will probably attract dozens of recovery scammers. In this post, I’ll explain how their scam works and how to avoid falling for it. How recovery scams work Recovery scammers target people who

What Are Recovery Scams? Read More »

T-Mobile Glitch Exposes Data, Plus Retailer Breached

In T-Mobile related news this week, a faulty update exposed customer data, and T-Mobile authorized retailer Connectivity Source suffered a data breach. Faulty update mix-up  The faulty T-Mobile update resulted in customers seeing other users’ sensitive data when logged in to their T-Mobile accounts.  According to The Verge, who first broke the story on Wednesday,

T-Mobile Glitch Exposes Data, Plus Retailer Breached Read More »

Ransomware Gang Claims Schools Not a Target

Ransomware gang 8Base declared yesterday in an X (formerly Twitter) post that “hospitals, non-profit organizations, social funds, and schools” were “NO LONGER of interest” to the criminal group. Instead, the gang claimed it would “leave NOTES with safety recommendations” if it accessed such organizations, presumably to help them beef up their cyber defenses. The gang’s

Ransomware Gang Claims Schools Not a Target Read More »

August Ransomware Roundup

According to data from eCrime.ch, 390 organizations were listed on ransomware leak sites in August. This is approximately an 18% decrease from July, which saw 478 organizations listed. The top five most targeted sectors in August were law (21), IT (18), construction (15), education (12), and government (11).  125 of the victim organizations, 32% of

August Ransomware Roundup Read More »

ente Auth Review: Secure Sync for Your Tokens

Note: I was not paid to write this review, and this post does not contain affiliate links Using an authenticator app is a great way to protect your online accounts. But which authenticator app should you choose? While apps like Google Authenticator and Authy are popular, it’s worth exploring some lesser-known alternatives. In this post, I’ll be focusing on

ente Auth Review: Secure Sync for Your Tokens Read More »

Pension Plan Holders at Risk of Identity Theft

On Wednesday, ransomware gang Cl0p began leaking the data it stole from Pension Benefits Information (PBI). The stolen data contains personal information, including SSNs, of customers of insurance and pension companies that work with PBI. Cl0p’s publication of this data puts these customers at risk of identity theft. So far, California Public Employees’ Retirement System

Pension Plan Holders at Risk of Identity Theft Read More »