Posts tagged Mobile
Protect Your Mobile Phone Numbers from Porting Scams

In August 2017, the NJCCIC published the blog post Hackers Are Circumventing 2FA and Here's What You Can Do About It to alert members of emerging social engineering campaigns targeting mobile phone carriers. In these campaigns, hackers called the carriers and impersonated the targeted victim when speaking to customer service representatives. They would then try to convince the representatives to port the victim’s phone number to a new phone. If the scheme worked and the representative ported the number to a phone within the hacker’s possession, the hacker could then use it to circumvent SMS-based two-factor authentication (2FA) enabled on the targeted victim’s online accounts. Fortunately, major US mobile phone carriers have recently implemented an additional security control that their customers can use to secure their accounts. Read our blog to find out more.

Read More
Mobile SecurityNJCCICMobile
Tired of Receiving Scam Calls? Don’t Just Sit There. Do Something About It.

Americans are inundated daily with scam calls and many may not know there are options available that help reduce the chance of receiving or answering a fraudulent phone call. This blog highlights one analyst's frustrations in receiving several of these nuisance calls every day and her effort to stop them by exploring various options provided by major US cell phone carriers.

Read More
2015 Data Breach Lessons Learned

If the past two years have taught us anything, it’s that the frequency and impact of data breaches will continue to grow if organizations do not do more to implement effective cybersecurity practices. The theft and sale of personal data is big business for profit-motivated hackers, while state and non-state actors clamor to get their hands on sensitive and potentially damaging information for various intents and purposes, from extortion to espionage.

Read More
The Future of Payments is Now

The United States is currently in the midst of the biggest transition of payment technology in several decades, as alternatives have emerged to provide a more secure option than the magnetic strip “swipe and sign” process used since the 1970s. Due to our longstanding use of this vulnerable payment process, the U.S. accounts for nearly half of the world’s credit card fraud, despite only 25 percent of global transactions occurring in the U.S.

Read More