Friday, September 29, 2017

Hackers Found a New Way to Rip Off ATMs

New ATM attacks are conducted remotely, till they watch the money flow out on the ground, so far overseas , but coming to the USA before the end of the year, according to the cyber experts involved. They think the overseas attacks are more tests, before they hit the USA. It is expected when it happens to be in the billions in losses.
from CTI Consulting http://ift.tt/2wY6WlO
via IFTTT

Friday, September 15, 2017

Don’t Get Duped by Phone Scammers Posing as Equifax

TrentonScottH : Don't believe the caller ID. No reputable company nor Equifax will ever call you about the breach. Just hang up. https://t.co/uA0AZcteo0
from CTI Consulting http://ift.tt/2y3LI6K
via IFTTT

Trenton Scott H. on Twitter

TrentonScottH : Threats to US rail have been in the news lately, but Londoners have been dealing with this kind of attack for a lon… https://t.co/0YR6flfDIB
from CTI Consulting https://twitter.com/i/web/status/908734148138930176
via IFTTT

Thursday, September 14, 2017

Trenton Scott H. on Twitter

TrentonScottH : The best passwords, authentication & apps won't protect you if the companies you give your data to are lax with the… https://t.co/vXSvuNMacx
from CTI Consulting https://twitter.com/i/web/status/908344682605772800
via IFTTT

Wednesday, September 13, 2017

New fears that trains could be targets for terrorists

TrentonScottH : Passenger rail security is not at the same level as aviation, & we know terrorists will always seek the soft targets https://t.co/mGmEFVnfIy
from CTI Consulting http://ift.tt/2xuuOSR
via IFTTT

Friday, September 8, 2017

Thursday, September 7, 2017

Trenton


from CTI Consulting http://ift.tt/2xeGiJS
via IFTTT

Equifax breach exposed data for 143 million consumers

TrentonScottH : This is a big deal, and the impact could be significant for many folks #cybersecurity https://t.co/iOjZOdMewF
from CTI Consulting http://ift.tt/2gMauRZ
via IFTTT

Wednesday, September 6, 2017

How to Beat Longer Lines at the Airport

TrentonScottH : Most #aviationsecurity professionals I know are enrolled in a trusted traveler program like PreCheck or Global Entry https://t.co/3cKCC1oaQM
from CTI Consulting http://ift.tt/2eHdf6y
via IFTTT

ISIS Urges Supporters To Poison Food At US Grocery Stores | Zero Hedge

Prepare to respond to this threat with mitigating options, but remember it is just a threat at this point. Mitigating options can include, going to frozen vegetables for short periods of time, finding ways to clean the foods you buy fresh. Most chemicals added to these foods can be washed off rather well. Do not fear, but watch the news and internet for early warnings and respond as needed. This actually has been done in the past, when a cult used hand made ricin to poison salad bars at a towns key restaurants. Not as effective as they expected, but it did make numbers of customers sick, and cause death to a few.
from CTI Consulting http://ift.tt/2gFbx6h
via IFTTT

Sunday, September 3, 2017

Texas Law Boosts Security for Judges

This is a law that is needed, and should be copied by other States as soon as possible. At minimum a risk analysis should be conducted of every court house and personal residence, Every route used should also be analyzed for possible ambush points.
from CTI Consulting http://ift.tt/2x3ZqtZ
via IFTTT

Data Breach Exposes Thousands of Job Seekers Citing Top Secret Government Work [Updated]

This shows one of the biggest issues in dealing with Data given out and being on the cloud in some way. The facts are still being developed but the method is fairly common. The data in this case often used by third party vendors to help people gain employment was not as secure as the data stored by the vendor the person providing the data to apparently was. This by the way is not as damaging by far as the OPM data breach a few years ago, which had that actual clearance data, very sensitive data, that will be used by China for years to come to decide who to target in the US Government by Chinese Agents. But in that case a slightly different method was used to gain the data. But still a third party was used to get around the security of the Government data base. Just like in any intelligence gathering attack, either for a Government or a Criminal element they always look for the weakest link, so after deciding the data they want they probe the security, during which time they will also see which other traffic is accessing the site, and each of those can be tracked back to an entity. If the security of the primary target proves too difficult then they go after the next targets. Always looking for the softest target, Everyone is at risk, and everyone could become a target, even you. It is not just employment data that is targeted, Health data is according to the Chinese intel targeting plan in one of their manuals. As soon as they gain the data, they look for more targeting data, the data they do not consider valuable they let their operatives put up for sale on the dark web. Which is then used by criminals to conduct ID theft and other criminal activity. Always they are looking for the weakest link, now look for a second at how many Doctors and their staff access the Health data cloud every day. Now do we have any weak links?
from CTI Consulting http://ift.tt/2etP6QY
via IFTTT