Categories
Featured

Nearly a million victims hit by massive BogusBazaar campaign — credit card details stolen, but here’s how to stay safe

[ad_1]

Almost a million people around the world have fallen victim to a highly organized fraud campaign, which scammed them out of some $50 million in the past couple of years.

According to a report from SRLabs, a group of cyber-criminals, supported by a wider network of affiliates, were organized into a crime ring dubbed BogusBazaar. This ring automated the creation and rotation of thousands of fake shopping websites – 22,500 domains, to be exact.

[ad_2]

Source Article Link

Categories
News

How to Enable Stolen Device Protection on iPhone

[ad_1]

When Apple released iOS 17.3 in January, it introduced a Stolen Device Protection feature to provide iPhone users with added security. This article explains what it does, why you might want to turn it on, and how to go about doing so.

ios stolen device protection
In 2023, reports began emerging about a new method thieves were using to steal iPhones and access users’ highly sensitive data. Thieves would surreptitiously spy on their victims in public while they entered their passcode, before going on to steal the device. With the passcode known to them, criminals could empty bank accounts, steal passwords, and make the iPhone untraceable.

Enter, Stolen Device Protection

To make it harder for a thief to access passcode-protected data on a stolen iPhone, Apple in iOS 17.3 included Stolen Device Protection. With the feature enabled, Face ID or Touch ID is required to access passwords in iCloud Keychain, Lost Mode settings, options for erasing the device, and making purchases in Safari.

In addition to the new biometric requirements, the feature also imposes a one-hour security delay on actions like changing an Apple ID password. In other words, if someone tries to change Apple ID login information, Face ID authentication is required, and then an hour must pass before the password can be changed. The only time this wait period is not imposed is when the device at a trusted location like home or work.

Actions Requiring Face ID/Touch ID With Stolen Device Protection Enabled

  • Viewing/using passwords or passkeys saved in iCloud Keychain
  • Applying for a new Apple Card
  • Viewing an Apple Card virtual card
  • Turning off Lost Mode
  • Erasing all content and settings
  • Taking certain Apple Cash and Savings actions in Wallet
  • Using payment methods saved in Safari
  • Using your iPhone to set up a new device

Note that these actions do not have a passcode backup, so you can’t use a passcode to avoid using Face ID or Touch ID.

Actions Requiring 1-Hour Delay With Stolen Device Protection Enabled

Actions that require biometric authentication and have a one-hour security delay include the following:

  • Changing your Apple ID password
  • Updating select Apple ID account security settings, including adding or removing a trusted device, trusted phone number, Recovery Key, or Recovery Contact
  • Changing your iPhone passcode
  • Adding or removing Face ID or Touch ID
  • Turning off Find My
  • Turning off Stolen Device Protection

How to Enable Stolen Device Protection

Note that Stolen Device Protection is only available on iPhones that are able to run iOS 17, which includes the iPhone XS and newer. Also, make sure your iPhone is up-to-date and running iOS 17.3 or later (Settings ➝ General ➝ Software Update). Here’s how to enable the feature.

  1. Open the Settings app.
  2. Scroll down and tap Face ID & Passcode (or Touch ID & Passcode, depending on iPhone model).
  3. Enter your passcode at the prompt.
  4. Scroll down and tap Stolen Device Protection.
  5. Toggle on the switch next to Stolen Device Protection, then tap Turn On at the prompt.

settingssettings

Note that if your iPhone is running iOS 17.4 or later, an additional option on this screen lets you choose to require a security delay when your device is Away from Familiar Locations, or Always. Otherwise, that’s all there is to it. You can just as easily turn off the feature by toggling off the Stolen Device Protection switch, but you’ll need to authenticate to do so.

[ad_2]

Source Article Link

Categories
Featured

Thousands of Social Security numbers stolen from government firm

[ad_1]

Hackers recently stole hundreds of thousands of social security numbers from an American consulting firm, with victims across the US possibly affected.

Greylock McKinnon Associates (GMA) has filed a new report with the Office of the Maine Attorney General, and sent a breach notification email to affected individuals.

[ad_2]

Source Article Link

Categories
News

How to Setup Stolen Device Protection on Your iPhone

Stolen Device Protection

Apple’s new iOS 17.3 comes with a really useful security feature, Stolen Device Protection. Are you concerned about the safety of your iPhone, especially in unfamiliar locations? You’ll be pleased to know that with iOS 17.3, Apple introduces Stolen Device Protection, a feature designed to elevate the security of your device beyond the existing measures. Let’s delve into how this feature works and guide you through setting it up.

Understanding Stolen Device Protection

This new layer of security activates when your iPhone is in unfamiliar surroundings. The idea is simple yet effective: when away from places like your home or office, your iPhone requires additional steps for certain functions. This is to prevent unauthorized access, especially in scenarios where your device might be stolen.

Biometric Authentication with Face ID or Touch ID

For certain actions like accessing saved passwords or credit cards, your iPhone will now solely rely on biometric authentication – Face ID or Touch ID. This means there’s no passcode fallback, ensuring that only you can access these sensitive features.

Security Delay for Critical Changes

Thinking about changing your Apple ID password or making similar significant adjustments? In unfamiliar locations, you’ll encounter a one-hour security delay. After this, a second biometric authentication is needed. This delay is strategically designed to stall unauthorized changes, giving you time to secure your Apple account and mark your iPhone as lost.

Setting Up Stolen Device Protection

Here’s the good part – setting up this feature on your iPhone. Before proceeding, ensure you’re using iOS 17.3 and have two-factor authentication for your Apple ID.

  1. Initiate the Setup: Go to Settings and select Face ID & Passcode.
  2. Enter Passcode: Input your device passcode to proceed.
  3. Activate the Feature: Here, you can toggle Stolen Device Protection on or off.

Remember, if you’re trying to disable this feature outside a familiar location, you’ll be subjected to a security delay.

How It Shields Your Device and Accounts

When Stolen Device Protection is active, actions like using saved passwords, making payments, or modifying critical settings demand biometric authentication. This includes:

  • Accessing Keychain-saved passwords and passkeys
  • Using saved payment methods in Safari
  • Turning off Lost Mode or erasing your device
  • Applying for a new Apple Card
  • Managing Apple Cash and Savings in Wallet
  • Setting up a new device using your iPhone

Interestingly, you can still use your passcode for Apple Pay purchases.

Security Delays for Critical Settings

For changing crucial settings like your Apple ID password or updating security settings, there’s a waiting period. After this, a second authentication is required, enhancing the security framework of your device.

Final Thoughts

Stolen Device Protection in iOS 17.3 is a testament to Apple’s commitment to user security. It’s a proactive approach to safeguarding your device and personal data, especially in today’s world where digital security is paramount. By following these simple steps, you can ensure that your iPhone remains secure, even in the most unfamiliar of places.

Apple’s new iOS 17.3 software is now available to download, you can install the update by going to Settings > General > Software update > Down and Install, once you have updated it is a good idea to turn on the new Stolen Device Protection Feature, you can find out more details about it over at Apple’s website.

Image Credit: Amanz

Filed Under: Apple, Apple iPhone, Guides





Latest timeswonderful Deals

Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, timeswonderful may earn an affiliate commission. Learn about our Disclosure Policy.

Categories
News

JLR Invests £10 million to combat stolen Range Rover problem

 

stolen range rover

JLR has announced that it has invested £10 million to combat the problem of stolen Land Rover and Range Rover vehicles in the UK, this has become a problem on vehicles that were produced from 2018 to 2022.

Range Rover and Land Rover vehicles become some of the most stolen vehicles in 2022, with a total of 5200 cars stolen. This has caused insurance companies to increase premiums significantly and also caused them to stop offering insurance in some areas.

The majority of the vehicles were being stolen in large cities like London and Manchester and many insurance companies are refusing to insure these vehicles in these areas  JLR used to offer its own insurance for its vehicles, but it stopped doing this as its partner refused to continue insuring the vehicles.

Its newer vehicles from 2022 onward do not have the same issue due to increased security and it has been updating the security of older vehicles to the same standard via a software update, if you own one of the affected vehicles you should take your car to the dealer for the software update.

While vehicle theft in the UK is affecting the whole car industry, at JLR we understand the negative impact this can have on the ownership experience for our clients. Our investment of more than £10 million demonstrates our ongoing commitment to tackling this issue.

Through our long-standing collaboration with law enforcement and key partners, our expert team will continue to develop and deploy effective anti-theft measures to ensure clients are protected. It is my personal priority.

Patrick McGillycuddy
Managing Director, JLR UK

This issue with stolen Land Rover and Range Rover vehicles has seen a negative impact on these vehicles’ second hand values, with the value of many of the vehicles dropping considerably below their previous market values. You can find out more details about the software update over at JLR at the link below, if you have not had the update you should get it done as soon as possible to protect your vehicle.

Source JLR

Filed Under: Auto News





Latest timeswonderful Deals

Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, timeswonderful may earn an affiliate commission. Learn about our Disclosure Policy.

Categories
News

Tracking the Digital Footprints: Investigating the Traceability of Stolen Cryptocurrencies

In the exciting realm of cryptocurrencies, where wealth can shift instantly, there’s a darker side hiding just out of sight. The theft of digital coins is sadly common, leading many to wonder if these vanished assets can be tracked down and reclaimed. Today, we’re going to delve into the intriguing realm of how crypto forensics companies track digital footprints to investigate the traceability of stolen cryptocurrencies.

The Cryptocurrency Crime Scene

Picture this: you wake up one fine morning, ready to check your crypto wallet, only to find it’s empty. Panic sets in, and you realize that you’ve fallen victim to a cryptocurrency theft. You’re not alone; cryptocurrency thefts have been on the rise. But here’s the twist – cryptocurrencies operate on a decentralized ledger called blockchain, which means every transaction is recorded. Can this help track down the culprits?

Understanding the Blockchain

Before we dive into the tracking process, let’s understand what makes it all possible – the blockchain. Think of it as a digital ledger, an open book where every cryptocurrency transaction is written down. These transactions are grouped into blocks and linked together in a chain, creating a secure and transparent record. But how can we use this to our advantage in tracking stolen cryptocurrencies?

The Tracking Process: Step by Step

Gather Information:

The first step in tracking stolen cryptocurrencies is gathering information about the theft. This includes details like the time of the theft, the wallet address involved, and any suspicious activities leading up to it.

Identify the Wallet Address:

Every cryptocurrency transaction involves sender and receiver wallet addresses. These addresses are alphanumeric strings unique to each wallet. To start tracking, you’ll need to identify the wallet address that received your stolen crypto.

Blockchain Analysis:

Here’s where the magic happens. The blockchain is public, meaning anyone can view transactions. You can use blockchain explorers like Etherscan (for Ethereum) or Blockchair (for Bitcoin) to search for the wallet address and trace its transactions.

Follow the Trail:

Once you’ve identified the thief’s wallet address, you can start tracing their digital footprints. Follow the trail of transactions to see where your stolen cryptocurrency went next. It might have changed hands several times.

Exchange Investigations:

Cryptocurrency thieves often try to cash out on exchanges. Keep an eye on popular exchanges for any deposits matching the stolen amount. Exchanges are required to follow KYC (Know Your Customer) procedures, making it harder for thieves to remain anonymous.

Law Enforcement Involvement:

If you’ve traced the stolen crypto to an exchange or identified the thief, it’s time to get law enforcement involved. Provide them with all the evidence you’ve gathered. They may work with international agencies to recover your funds.

Challenges in Tracking

While the process might sound straightforward, tracking stolen cryptocurrencies is no walk in the park. Here are some challenges you might encounter along the way:

Anonymity: Cryptocurrency transactions can be pseudonymous, meaning wallet addresses are not directly tied to real-world identities. This anonymity can make it difficult to pinpoint the culprits.

Mixers and Tumblers: Some thieves use mixing services or tumblers to obfuscate the trail of stolen cryptocurrencies. These services shuffle funds between multiple addresses, making tracking more challenging.

Jurisdictional Issues: Cryptocurrency operates in a borderless digital realm. Tracking and recovering stolen funds might involve navigating complex jurisdictional issues, especially if the thief is in another country.

Hacking Techniques: Sophisticated hackers might employ various techniques to cover their tracks, including using stolen or hacked wallets to launder the stolen crypto.

Success Stories

Mt. Gox Hack: In 2014, Mt. Gox, one of the largest cryptocurrency exchanges at the time, suffered a massive hack resulting in the loss of 850,000 bitcoins. Over the years, investigators managed to trace a portion of these bitcoins to various wallet addresses. While not all the stolen funds were recovered, this case demonstrates the potential for tracking stolen crypto.

Twitter Hack: In 2020, a high-profile Twitter hack saw several celebrity accounts promoting a bitcoin scam. While the initial investigation focused on the hack itself, cryptocurrency forensic experts were able to trace the stolen bitcoins to different addresses. A teenager was later arrested and charged with the hack.

Preventing Crypto Theft

While it’s intriguing to explore the world of tracking stolen cryptocurrencies, prevention is always better than cure. Here are some tips to keep your digital assets safe:

Use Physical Wallets: Hardware wallets are tangible devices that keep your digital currencies offline, shielding them from internet threats.

Turn On Two-Step Verification (2SV): Boosting your exchange and wallet security with an additional protective step can keep intruders at bay.

Stay Informed: Keep yourself updated on the latest security threats and scams in the crypto world. Knowledge is your best defense.

Beware of Phishing: Be cautious of phishing emails and websites that aim to steal your login credentials. Always double-check URLs and email sources.

Secure Your Private Keys: Your private keys are the keys to your cryptocurrency kingdom. Store them in a safe place and never share them with anyone.

Consider Insurance: Some cryptocurrency exchanges and custodians offer insurance coverage for digital assets. It’s worth exploring such options for added peace of mind.

Conclusion

The world of cryptocurrencies is a thrilling one, but it’s not without risks. Prevention remains the best strategy. By adopting secure practices and staying vigilant, you can significantly reduce the risk of falling victim to crypto theft. Remember, in this digital frontier, it’s not just about the hunt for stolen treasure but also about safeguarding your own.