<b>⌨ How Internet Savvy are Your Leaders? ⌨</b>
<code>Back in April 2015, I tweeted about receiving a letter via snail mail suggesting the search engine rankings for a domain registered in my name would suffer if I didnβt pay a bill for some kind of dubious-looking service Iβd never heard of. But it wasnβt until the past week that it become clear how many organizations β including towns, cities and political campaigns β actually have fallen for this brazen scam.</code><code>Media</code><code>Image: Better Business Bureau.</code><code>The letter I tweeted about was from a company called Web Listings Inc., and it said I should pay a $85 charge for an βannual web site search engineβ service.</code><code>The first clue that this was probably a scam was the letter said halfway down in capital letters βTHIS IS NOT A BILL,β although it sure was made to look like one. Also, the domain it referenced was βfuckbriankrebs.com,β which was indeed registered using my street address but certainly not by me.</code><code>The sad truth is plenty of organizations *are* paying the people behind this charade, which is probably why Web Listings has been running it continuously for more than a decade. Most likely thatβs because some percentage of recipients confuse this notice with a warning about a domain name they own that is about to expire and needs to be renewed.</code><code>We know plenty of people are getting snookered thanks to searchable online records filed by a range of political campaigns, towns, cities and municipalities β all of which are required to publicly report how they spend their money (or at least that of their constituents).</code><code>According to a statement filed with the Federal Election Commission, one of the earliest public records involving a payment to Web Listings dates back to 2008 and comes from none other than the the 2008 Hillary Clinton for President fund.</code><code>The documents unearthed in this story all came compliments of Ron Guilmette, a most dogged and intrepid researcher who usually spends his time tracking down and suing spammers. Guilmette said most of the public references he found regarding payments to Web Services Inc. are from political campaigns and small towns.</code><code>βWhich naturally raises the question: Should we really be trusting these people with our money?β Guilmette said. βWhat kind of people or organizations are most likely to pay a bill that is utterly phony baloney, and that actually isnβt due and payable? The answer is people and organizations that are not spending their own money.β</code><code>Also paying $85 (PDF) to Web Listings was the 2015 campaign for Democrat Jim Kenney, the current mayor of Philadelphia.</code><code>A fund for the New York City Council campaign of Zead Ramadan (D) forked over $85 to Web Listings in 2013.</code><code>Also in 2013, the Committee to Elect Judge Victor Heutsche (D) paid $85 to keep his Web site in good standing with Web Listings. Paul T. Davis, a former Democratic state representative from Kansas handed $85 (PDF) to Web Listings in 2012.
</code><code>Media</code><code>Image: Better Business Bureau.</code><code>Lest anyone think that somehow Democratic candidates for office are more susceptible to these types of schemes, a review of the publicly-searchable campaign payments to Web Listings Inc. uncovered by Guilmette shows a majority of them were for Web sites supporting Republican candidates.</code><code>The Friends of Mike Turzai committee spent $65 in 2010 on the GOP Representative from Pennsylvania.</code><code>The fundraising committee for Republican Dick Blackβs 2012 campaign for the Virginia Senate also paid Web Listings Inc. $85. The campaign to elect Ben Chafin as a Republican delegate in Virginia in 2013 also paid out. </code><code>Robert Montgomery, a former GOP state representative in Kansas, paid $85 (PDF) to Web Listings in 2012.</code><code>Those in charge of the purse strings for the βFriends of GOP New York Stateβ¦
<code>Back in April 2015, I tweeted about receiving a letter via snail mail suggesting the search engine rankings for a domain registered in my name would suffer if I didnβt pay a bill for some kind of dubious-looking service Iβd never heard of. But it wasnβt until the past week that it become clear how many organizations β including towns, cities and political campaigns β actually have fallen for this brazen scam.</code><code>Media</code><code>Image: Better Business Bureau.</code><code>The letter I tweeted about was from a company called Web Listings Inc., and it said I should pay a $85 charge for an βannual web site search engineβ service.</code><code>The first clue that this was probably a scam was the letter said halfway down in capital letters βTHIS IS NOT A BILL,β although it sure was made to look like one. Also, the domain it referenced was βfuckbriankrebs.com,β which was indeed registered using my street address but certainly not by me.</code><code>The sad truth is plenty of organizations *are* paying the people behind this charade, which is probably why Web Listings has been running it continuously for more than a decade. Most likely thatβs because some percentage of recipients confuse this notice with a warning about a domain name they own that is about to expire and needs to be renewed.</code><code>We know plenty of people are getting snookered thanks to searchable online records filed by a range of political campaigns, towns, cities and municipalities β all of which are required to publicly report how they spend their money (or at least that of their constituents).</code><code>According to a statement filed with the Federal Election Commission, one of the earliest public records involving a payment to Web Listings dates back to 2008 and comes from none other than the the 2008 Hillary Clinton for President fund.</code><code>The documents unearthed in this story all came compliments of Ron Guilmette, a most dogged and intrepid researcher who usually spends his time tracking down and suing spammers. Guilmette said most of the public references he found regarding payments to Web Services Inc. are from political campaigns and small towns.</code><code>βWhich naturally raises the question: Should we really be trusting these people with our money?β Guilmette said. βWhat kind of people or organizations are most likely to pay a bill that is utterly phony baloney, and that actually isnβt due and payable? The answer is people and organizations that are not spending their own money.β</code><code>Also paying $85 (PDF) to Web Listings was the 2015 campaign for Democrat Jim Kenney, the current mayor of Philadelphia.</code><code>A fund for the New York City Council campaign of Zead Ramadan (D) forked over $85 to Web Listings in 2013.</code><code>Also in 2013, the Committee to Elect Judge Victor Heutsche (D) paid $85 to keep his Web site in good standing with Web Listings. Paul T. Davis, a former Democratic state representative from Kansas handed $85 (PDF) to Web Listings in 2012.
</code><code>Media</code><code>Image: Better Business Bureau.</code><code>Lest anyone think that somehow Democratic candidates for office are more susceptible to these types of schemes, a review of the publicly-searchable campaign payments to Web Listings Inc. uncovered by Guilmette shows a majority of them were for Web sites supporting Republican candidates.</code><code>The Friends of Mike Turzai committee spent $65 in 2010 on the GOP Representative from Pennsylvania.</code><code>The fundraising committee for Republican Dick Blackβs 2012 campaign for the Virginia Senate also paid Web Listings Inc. $85. The campaign to elect Ben Chafin as a Republican delegate in Virginia in 2013 also paid out. </code><code>Robert Montgomery, a former GOP state representative in Kansas, paid $85 (PDF) to Web Listings in 2012.</code><code>Those in charge of the purse strings for the βFriends of GOP New York Stateβ¦
π΄ Satan Ransomware Variant Exploits 10 Server-Side Flaws π΄
π Read
via "Dark Reading: ".
Windows, Linux systems vulnerable to self-propagating 'Lucky' malware, security researchers say.π Read
via "Dark Reading: ".
Darkreading
Satan Ransomware Variant Exploits 10 Server-Side Flaws
Windows, Linux systems vulnerable to self-propagating 'Lucky' malware, security researchers say.
π΄ New Google+ Breach Will Lead to Early Service Shutdown π΄
π Read
via "Dark Reading: ".
A breach affecting more than 52 million users was patched, but not before leading to the company rethinking the future of the service.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Women in Cyber Take the Spotlight β
π Read
via "Threatpost | The first stop for security news".
Women are key to solving the workforce shortage, which is expected to reach 3.5 million open jobs by 2022.π Read
via "Threatpost | The first stop for security news".
Threat Post
Women in Cyber Take the Spotlight
Women are key to solving the workforce shortage, which is expected to reach 3.5 million open jobs by 2022.
π How to use Cloudflare encrypted DNS on Android π
π Read
via "Security on TechRepublic".
If you're looking for an easy means of enabling encrypted DNS on Android, the Cloudflare 1.1.1.1 app is the way to go.π Read
via "Security on TechRepublic".
TechRepublic
How to use Cloudflare encrypted DNS on Android | TechRepublic
If you're looking for an easy means of enabling encrypted DNS on Android, the Cloudflare 1.1.1.1 app is the way to go.
π΄ 'Highly Active' Seedworm Group Hits IT Services, Governments π΄
π Read
via "Dark Reading: ".
Since September, the cyber espionage actors have targeted more than 130 victims in 30 organizations including NGOs, oil and gas, and telecom businesses.π Read
via "Dark Reading: ".
Darkreading
'Highly Active' Seedworm Group Hits IT Services, Governments
Since September, the cyber espionage actors have targeted more than 130 victims in 30 organizations including NGOs, oil and gas, and telecom businesses.
π΄ DanaBot Malware Adds Spam to its Menu π΄
π Read
via "Dark Reading: ".
A new generation of modular malware increases its value to criminals.π Read
via "Dark Reading: ".
Darkreading
DanaBot Malware Adds Spam to its Menu
A new generation of modular malware increases its value to criminals.
β Facebook fined $11m for misleading users about how data will be used β
π Read
via "Naked Security".
They said Facebook emphasizes the service being free, not that it's making big bucks off users' data. They ordered the company to apologize.π Read
via "Naked Security".
Naked Security
Facebook fined $11m for misleading users about how data will be used
They said Facebook emphasizes the service being free, not that itβs making big bucks off usersβ data. They ordered the company to apologize.
β Teen SWATter who had 400 schools evacuated lands 3 years in jail β
π Read
via "Naked Security".
George Duke-Cohan is the British teen who posed as a worried father whose daughter had called him mid-flight during a hijacking.π Read
via "Naked Security".
Naked Security
Teen SWATter who had 400 schools evacuated lands 3 years in jail
George Duke-Cohan is the British teen who posed as a worried father whose daughter had called him mid-flight during a hijacking.
β Dark web goldmine busted by Europol β
π Read
via "Naked Security".
Whatβs the safest way to buy counterfeit banknotes? Not on the dark web market, as 235 people have just discovered to their cost.π Read
via "Naked Security".
Naked Security
Dark web goldmine busted by Europol
Whatβs the safest way to buy counterfeit banknotes? Not on the dark web market, as 235 people have just discovered to their cost.
π 5 cloud security trends to watch in 2019 π
π Read
via "Security on TechRepublic".
While AWS, Microsoft Azure, and Google Cloud Platform are responsible for protecting cloud infrastructure, customers must monitor other vulnerabilities, according to Palo Alto Networks.π Read
via "Security on TechRepublic".
β Linux.org Redirected to NSFW Page Spewing Racial Epithets β
π Read
via "Threatpost | The first stop for security news".
Administrators lost control of the domain for several hours in a DNS hijacking incident.π Read
via "Threatpost | The first stop for security news".
Threat Post
Linux.org Redirected to NSFW Page Spewing Racial Epithets
Administrators lost control of the domain for several hours in a DNS hijacking incident.
π΄ CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks π΄
π Read
via "Dark Reading: ".
But it still takes an average of 85 days to spot one, the security firm's incident response investigations found.π Read
via "Dark Reading: ".
Darkreading
CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks
But it still takes an average of 85 days to spot one, the security firm's incident response investigations found.
π What the Google+ security flaw and expedited shutdown means for enterprise users π
π Read
via "Security on TechRepublic".
The consumer version of the social networking service is being shut down faster than originally announced, but the enterprise version will live on.π Read
via "Security on TechRepublic".
TechRepublic
What the Google+ security flaw and expedited shutdown mean for enterprise users
The consumer version of the social networking service is being shut down faster than originally announced, but the enterprise version will live on.
π Facebook data privacy scandal: A cheat sheet π
π Read
via "Security on TechRepublic".
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.π Read
via "Security on TechRepublic".
TechRepublic
Facebook data privacy scandal: A cheat sheet
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.
π 3 ways dark web data trade will change in 2019, and how to protect your business π
π Read
via "Security on TechRepublic".
Sensitive data compromise was a huge problem in 2018 and remains a top concern going into 2019. Here are the three things companies should look out for.π Read
via "Security on TechRepublic".
TechRepublic
3 ways dark web data trade will change in 2019, and how to protect your business
Sensitive data compromise was a huge problem in 2018 and remains a top concern going into 2019. Here are the three things companies should look out for.
π΄ How Well Is Your Organization Investing Its Cybersecurity Dollars? π΄
π Read
via "Dark Reading: ".
The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it.π Read
via "Dark Reading: ".
Dark Reading
How Well Is Your Organization Investing Its Cybersecurity Dollars?
The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it.
π΄ Grammarly Takes Bug Bounty Program Public π΄
π Read
via "Dark Reading: ".
The private bug bounty program has nearly 1,500 participants and is ready for a public rollout with HackerOne.π Read
via "Dark Reading: ".
Dark Reading
Grammarly Takes Bug Bounty Program Public
The private bug bounty program has nearly 1,500 participants and is ready for a public rollout with HackerOne.
β Biometrics: Security Solution or Issue? β
π Read
via "Threatpost | The first stop for security news".
Issues still exist when it comes to securing biometrics.π Read
via "Threatpost | The first stop for security news".
Threat Post
Biometrics: Security Solution or Issue?
Issues still exist when it comes to securing biometrics.
π Capitalinstall malware targets healthcare sector, delivers payload via Microsoft Azure π
π Read
via "Security on TechRepublic".
Cloud storage providers offer virus and malware scanning, but the existence of that service is not enough to assume files from the cloud are not malicious.π Read
via "Security on TechRepublic".
π΄ NetSecOPEN Names Founding Members, Board of Directors π΄
π Read
via "Dark Reading: ".
The organization is charged with building open, transparent testing protocols for network security.π Read
via "Dark Reading: ".
Darkreading
NetSecOPEN Names Founding Members, Board of Directors
The organization is charged with building open, transparent testing protocols for network security.