Skip to main content

How 1-Time Passcodes Became a 1

Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world’s largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling […]

Gardening For The Greater Good1

Gardening is often regarded as an activity with numerous benefits for one’s health. However, getting started with the hobby can be intimidating; how to care for different seeds, what are the differences between different types of soils, and the list goes on. Libraries, as central hubs of their communities, have the unique opportunity to be […]

PayPal Phishing Scam Uses Invo1

PayPal Phishing Scam Uses Invoices Sent Via PayPal

Scammers are using invoices sent through PayPal.com to trick recipients into calling a number to dispute a pending charge. The missives — which come from Paypal.com and include a link at Paypal.com that displays an invoice for the supposed transaction — state that the user’s account is about to be charged hundreds of dollars. Recipients […]

When Efforts to Contain a Data1

Earlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The missive alleged that an auction on the site for data stolen from 10 million customers of Mexico’s second-largest bank was fake news and harming the bank’s reputation. The administrator responded to this empty threat by purchasing […]

Sounding the Alarm on Emergenc1

The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System — a national public warning system used to deliver important emergency information, such as severe weather and AMBER alerts. The DHS warning came in advance of a workshop to be […]

It Might Be Our Data, But It’s

Image: Shutterstock. A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans. The firm’s analysis of the data suggests it corresponds to current and former customers of AT&T. The telecommunications giant stopped […]

How Writing Contributes To A L1

There are many ways in which librarians can advance advance and develop their careers, like taking different courses or attending conferences. However, one maybe underutilized method is to improve through writing. Guest writer Siobhán McGuinness shares how writing helped her throughout her career. Are you curious what Princh can offer for your library and your […]

Microsoft Patch Tuesday, Augus1

Microsoft today released updates to fix a record 141 security vulnerabilities in its Windows operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Redmond also addressed multiple flaws in Exchange Server — including one that was disclosed publicly prior […]

Class Action Targets Experian 1

A class action lawsuit has been filed against big-three consumer credit bureau Experian over reports that the company did little to prevent identity thieves from hijacking consumer accounts. The legal filing cites liberally from an investigation KrebsOnSecurity published in July, which found that identity thieves were able to assume control over existing Experian accounts simply […]

How Libraries Benefit The Comm1

A library is a collection of information resources, in print or in other forms that are organized and made accessible for reading or study. It is the hub of every learning institution and facilitates boosting literacy levels in countries, continents, and the world at large. Libraries offer past and present information that help and equip […]

No SOCKS, No Shoes, No Malware1

With the recent demise of several popular “proxy” services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly of the Internet. Compounding the problem, several remaining malware-based proxy services have chosen to block new registrations to avoid swamping their networks with a […]

Breach Exposes Users of Microl1

Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, recently fixed a vulnerability in their website that exposed their entire user database. Microleaves claims its proxy software is installed with user consent, but data exposed in the breach shows the service has a lengthy history of […]

A Retrospective on the 2015 As1

It’s been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and extortion of many Ashley Madison users, and to at least two suicides. To date, little is publicly known about the perpetrators or the true motivation for […]

Massive Losses Define Epidemic1

U.S. state and federal investigators are being inundated with reports from people who’ve lost hundreds of thousands or millions of dollars in connection with a complex investment scam known as “pig butchering,” wherein people are lured by flirtatious strangers online into investing in cryptocurrency trading platforms that eventually seize any funds when victims try to […]