Imagine the scene that plays out in the dry season on the serengeti. Imagine the familiar sound track of Attenborough narrating the behaviors of the pride of lions that lies in wait for the wildebeest that come to quench their thirst. Stealing an idea from Mother Nature, a 'watering hole attack' is used by an online predator to target a group of people with a common interest or activity. Here are some examples of such attacks from both the cyber world and the real world.LEARN MORE
EXAMPLE 1: Hackers may Infect a highly popular website at a specific time knowing more people will be visiting that site for a reason e.g. during a world cup or right after an earthquake or even the site of a major news outlet.HAPPENED FOR REAL
EXAMPLE 2: Watch out who bumps into you at that crowded bar or venue - some place like a real watering hole. Scammers may have card skimmers that capture details of your credit card even if it is in your wallet. Protect yourself with an RFID blocking wallet or handbag.MADE THE NEWS
EXAMPLE 3: Scammers may post QR codes at crowded venues or public areas. The QR codes may point to malicious website or cause a malicious app to be downloaded to your phone. Avoid scanning QR codes in public spaces.
Phone rings and a mom hears her son's voice. “Mom, I have been in an accident and hit somebody. I have been arrested and need to post bail. My friend will come home in a few minutes. Please hand him $5000 in cash. It is urgent!”
Big earthquake in Turkey! Disaster news clogs social media channels. Ads for disaster relief pop up on social media feeds as well as banner ads on websites. Should you click on them and process payment with your credit card?
'Sha Zhu Pan' meaning Pig Butchering. Find, fatten and slaughter the pig. A chance online encounter, a pretend 'mis-dialled' number to start. These are individually targeted and leave a trail of financial and emotional distress.
Well, it is not always our fault. The companies that we do business with get breached too. The apps and devices that we use get targeted with new attacks.
A creepy name, Russian intelligence, 50 countries, thousands of businesses, the take down (maybe ...). An NSA advisory makes this news the talk of the town.READ MORE
Bad guys may have stolen your information (again!) and now maybe coming for that storage device in your home that has all your precious photos and documents.READ MORE
Yet another example of why we hate data brokers and why there can be no security in the home without privacy. Data is the new oil. Data brokers are the new OPECREAD MORE