Written: December 28, 2016
I do own a few Apple products in my business:
- MacBook Pro 17″
- MacBook Pro 15″
So today when I received the following email it looked legitimate:
The first clue that this email may not be officially from Apple was that it started with Dear Customer, instead of using my first and last name. I next clicked on the From field in the email to see who actually sent the message:
OK, so now I knew that this wasn’t an official Apple email because the From address didn’t contain apple.com in it’s name. Furthermore, when I hover over the link for Learn More the address was revealing:
This is the hacker’s phishing address, not an actual apple.com address.
Even when an email comes from a big name like Apple, do a little checking before clicking any hyperlink, just to ensure your safety and not fall victim to a phishing scheme that is trying to steal your Apple ID and password.
Written: December 22, 2016
As a vendor I receive many holiday greetings by email, so I wanted to share some of them with you, have a Merry Christmas and a Happy New Year in 2017.
Area Mobile Solutions
The Barefoot Sage
Global Client Services
Oregon Right to Life
Rolling Hills Community Church
, Area Mobile Solutions
, Global Client Services
, Oregon Right to Life
, Portland Velo
, Rolling Hills Community Church
, The Barefoot Sage
, Todd's Automotive
, Tualatin Chamber
Written: December 19, 2016
It’s Monday morning, so time to get caught up on my emails for the day. Ah, here’s one from a company that I’ve used before: LogMeIn. They have a neat service to allow remote control of computers, quite the time saver so that I don’t have to hop into my car and drive over to a client location and see what is going on with their computer while browsing a web site that I’ve built.
The actual email looked a bit suspicious to me at first.
What caught my eye first was that there was no corporate logo in the email, or a footer with the typical security language.
Secondly, there was no personal information like my complete first and last name or my account number.
The final determination that this email was a hacking using a phishing scheme was the actual hyperlinks, as I mouse over the hyperlinks they go to some hacked web site in Japan, not logmein.com in any way:
So there you have it, to ensure that an email from a vendor is legitimate look for these good signs:
- You full name, first and last
- An account number
- A corporate logo
- Security language in the footer of the email
- Links that go to the trusted web site
Written: December 15, 2016
Many of us have online accounts for business or entertainment, however when they get hacked then our personal data has been stolen too, which could place your financial life in trouble. Today I received a notice from Yahoo about their latest data breach, here’s what they had to say:
We are writing to inform you about a data security issue that may involve your Yahoo account information. We have taken steps to secure your account and are working closely with law enforcement.
Law enforcement provided Yahoo in November 2016 with data files that a third party claimed was Yahoo user data. We analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with a broader set of user accounts, including yours. We have not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016.
What Information Was Involved?
The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers. Not all of these data elements may have been present for your account. The investigation indicates that the stolen information did not include passwords in clear text, payment card data, or bank account information. Payment card data and bank account information are not stored in the system we believe was affected.
What We Are Doing
We are taking action to protect our users:
- We are requiring potentially affected users to change their passwords.
- We invalidated unencrypted security questions and answers so that they cannot be used to access an account.
- We continuously enhance our safeguards and systems that detect and prevent unauthorized access to user accounts.
What You Can Do
We encourage you to follow these security recommendations:
- Change your passwords and security questions and answers for any other accounts on which you used the same or similar information used for your Yahoo account.
- Review all of your accounts for suspicious activity.
- Be cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information.
- Avoid clicking on links or downloading attachments from suspicious emails.
Additionally, please consider using Yahoo Account Key, a simple authentication tool that eliminates the need to use a password on Yahoo altogether.
For More Information
For more information about this issue and our security resources, please visit the Yahoo Security Issues FAQs page available at https://yahoo.com/security-update.
Protecting your information is important to us and we work continuously to strengthen our defenses.
Chief Information Security Officer