August Letter

Hi there,

August's heat hasn't slowed the assault on personal information.

The month started with a PSA from the FBI. According to the August 2nd warninghackers are increasing their focus on stealing personal information from residential and home office environments.

Screen Shot 2018-08-10 at 7.35.57 PM

Examples of targeted devices include:

  • routers
  • Wi-Fi links
  • A/V equipment
  • IP cameras
  • satellite antenna equipment

Rich with personal information, these devices are hacked to tap the streams of data flowing through its wires. If information is the "new oil," then consider everyday internet appliances, like a router, as oil rigs drilling over a vast field of unclaimed crude.

What makes otherwise mundane and boring personal information so valuable to nefarious actors from around the world?

Well, as if on cue and the same day as the FBI's warning, our cyber-guru Krebs wrote:

"Cybercriminals are launching large-volume campaigns in a highly personalized way."

Hacker OGThose that would otherwise hack Fortune 500 companies are now using personal information (see FBI's PSA above) to target individuals in volume, because:

  • they can and it works
  • the economics pay
  • the targets are unaware and unprotected
  • they likely will never be caught

July 2018 image of hacker “OG” - Joel Ortiz - notorious for stealing financial assets from individuals online.

Krebs continues:

"It has never been easier for scam artists to launch convincing, targeted phishing and extortion scams that are automated on a global scale.

..., it seems almost certain we will soon witness many variations on these phishing campaigns that leverage customized data elements to enhance their effectiveness."

Krebs' point is this: the most sophisticated criminals on the planet are aiming to hack YOU with specially engineered and personalized attacks engineered to be as effective and damaging as possible. Read more by Krebs, below. 

Critical Thinking for the Digital Age

We need to make a fundamental adjustment to how we think about our personal information. Digital ownership and autonomy (like private email), information's rule of capture, and the development of critical thinking skills; all will be crucial to avoiding risks and maximizing opportunities in the new Digital Age.

For more news from August that relates to individuals, personal information and technology, and surviving the super-cycle of online crime ahead, see this month's stories at the bottom.

Coming Events

We're excited about a busy fall schedule ahead, and will be sharing our themes for 2018-2019 at these following events:

"The Impact of Cyber Threats on You and Your Business"

Bank of America - Business Banking 

  • September 11th, Jacksonville, FL
  • September 12th, Tallahassee, FL
  • September 13th, Pensacola, FL
  • September 25th, Ft. Lauderdale,FL
  • September 26th, West Palm Beach, FL

For this series of events, I'll present "Cybersecurity — An Issue for the Boardroom, Break Room and Living Room" and will participate in a number of panels to discuss the importance of cybersecurity awareness and planning in all aspects of your personal life and business.

"The Greatest Transfer of Wealth in History" 

The Total Wealth Symposium - The Four Seasons Hotel

  • September 20th - 22nd, Las Vegas, NV

I'm thrilled to be asked back by the folks at Banyan Hill for the 4th consecutive time, and this year will present on what to expect during the coming years in cyber-threats.

Conference attendees include Individual investors that understand risk management and asset protection, and want to take action to protect.

On Saturday the 22nd I'll hold a workshop on “Securing Your Home Routers and Networks."  Attendees will get an introduction to the science and technology behind Router Security and how it uses an "IT department in the cloud" to deliver commercial-grade security 24/7/365, simply and remarkably affordable.

"Cyber Risk for Affluent Families and their Advisors"

Citi Private Bank and Family Office Group

  • October 3rd, St. Louis, MO
  • October 4th, Milwaukee, WI

At these events, I'll again focus on the human element of digital-related risk, and our need to drive higher skill levels for critical thinking "... from the boardroom to the break room, to the living room."  

If you are attending any of the events, or are in the area on these dates and would like to meet, please let me or diane@totaldigitalsecurity.com know.  Also, you can access our events calendar here.

Thanks for reading, and I hope you will stay in touch as we build, learn, and share all we can for Survival and Success in the Digital Age.

Brad Deflin

View or print online.

cash_in a briefcase.jpg

The Year Targeted Phishing Went Mainstream

Aug. 2nd - by Krebs. This is a must-read to understand and be aware of how and why your personal information is increasingly under attack, even at home.

read more button blue

1-million-decrypted-gmail-and-yahoo-accounts-being-sold-on-dark-web-main-448539-edited.jpg

Gov Officials: New Gmail Feature Opens Users to Phishing Risks

Meanwhile, Big Tech is at it again; stealing and abusing personal information, and leaving billions vulnerable to serious consequences. via @ABC.

read more button blue

Screen Shot 2018-08-26 at 1.52.11 PM.png

The Quest for Personal Information Follows No Rules

Aug 24th - Palm Beach Post

"Cops in Palm Beach County and across the country are using secret cellphone tracking devices that could let them see ... possibly everything on your phone. You’re not supposed to know. No, this is not the beginning of a conspiracy novel. It’s a well-documented reality so guarded..."

read more button blue

cashgraf.jpg

ATM Cash Scheme Nets Millions

Aug. 14 - by Krebs -

bank disclosed hackers had broken into its servers, stealing nearly $2 million in fraudulent bank transfers and $11.5 million unauthorized ATM withdrawals from more than two dozen cash machines across multiple countries.

read more button blue

fax hacked netwrok.png

Networks Hacked Through Fax Machine

Aug. 13 - The Hacker News

"What maximum a remote attacker can do just by having your Fax machine number? Believe it or not, but your fax number is literally enough for a hacker to gain complete control over the printer and possibly infiltrate the rest of the network connected to it."

read more button blue

ransomware user laptop screen.png

Iranian hackers turn to ransomware as economy stalls

Aug. 7th, - The Wall Street Journal. 

"Hackers in Iran are turning to alternative sources of revenue."

Five new types of ransomware were built by hackers in Iran, says Accenture.

read more button blue

To view past CyberAdvisor Letters, please click here:

Previous Letters

To view past Blog posts, please click here:

Previous Blogs

Copyright © 2018 Total Digital Security, All rights reserved.
Total Digital Security - 301 Clematis Street, Suite 3000, West Palm Beach, FL 33401