Under Armour's MyFitnessPal Data Breach Affected 150 Million Users

Under Armour,  the fitness company that owns MyFitnessPal,  disclosed today a data breach that affected about 150 million users. MyFitnessPal, a food and nutrition application, earlier this week became aware of the breach, which took place late last month.

The breached data did not include any Social Security numbers, driver license numbers or any other government-issued identifiers, according to Under Armour. The company also said payment card information was not collected.

“The company quickly took steps to determine the nature and scope of the issue and to alert the MyFitnessPal community of the incident,” Under Armour wrote in a press release.

Four days after Under Armour became aware of the issue, the company said it started to notify members of the MyFitnessPal community via email and in-app messaging. Under Armour recommends MyFitnessPal users change their passwords.

“Under Armour is working with leading data security firms to assist in its investigation, and also coordinating with law enforcement authorities,” the press release stated. “The investigation indicates that the affected information included usernames, email addresses, and hashed passwords – the majority with the hashing function called bcrypt used to secure passwords.”

Apple releases iOS 11.3 with new Animojis

Apple  just released an iOS update for your iPhone and iPad. 11.3 introduces a ton of bug fixes but also a bunch of new features. If you forgot about Animjois, today is your lucky day as Apple is adding four new Animojis — a dragon, a bear, a lion and a skull.

But that’s not all. Apple already shared a preview of iOS 11.3 a couple of months ago. There’s a big ARKit update to ARKit 1.5. It can recognize more objects and surfaces.

And iOS 11.3 is also the battery update we’ve all been waiting for. There’s some new info in the settings about the status of your battery. It tells you the overall capacity and if it’s time to change your battery.

You can also choose to disable Apple’s controversial decision to throttle performance with old batteries. Apple says it’s a beta feature for now.

Apple is also introducing a new feature in the Health app. You can now centralize all your health records in the app. It’s only limited to a handful of clinics for now.

Apple is adding customer support conversations to Messages. You can initiate a conversation with a business to order something, book a table and more. Discover, Hilton, Lowe’s and Wells Fargo are already on board. Health Records and Business Chats are only available in the U.S. as a beta for now.

You’ll also see a new privacy icon across the operating system. A new website to export all your data is coming in May as well. Apple needs to add those features to comply with GDPR.

Finally, Apple Music is getting a new video clips section, the App Store Updates tab now shows you the size of each update and more tiny little things. And if you care about security, it’s always a good thing to update to the latest version of iOS. Unfortunately, iOS 11.3 still doesn’t include iMessage in iCloud.

Back up your iPhone or iPad to iCloud or your computer using iTunes before updating. You can then head over to the Settings app, then ‘General’, then ‘Software Update’. macOS, watchOS and tvOS updates are also available today.

7 Signs of Business Email Fraud

Depositphotos_146680381_s-2015.jpg

Companies rely on email for most communications — e.g., interacting with customers, running marketing campaigns, negotiating contracts with suppliers and managing a distributed workforce. While email offers various benefits, including speed and efficiency, its users can often fall victim to fraud due to the platform’s prevalence and success.

In fact, email is widely exploited by hackers for the execution of sophisticated phishing attacks, targeting commercially sensitive and personally identifiable information and costing hundreds of millions of dollars to businesses every year.

Fortunately, detecting and preventing email scams is possible even if you are not a cybersecurity expert. As a founder, manager or employee, you can significantly reduce the risk of data loss in your organization by being aware of the typical signs of business email fraud.

1. Web-Based Free Email Accounts

Anyone with an internet connection can create a free email account and use a generic address like companyabc@mail.com to send fraudulent messages. In contrast, only verified domain owners have the ability to set up and allocate custom email addresses, such as employee@companyabc.com or ceo@businessdec.com.

This being said, there is no reason for a sound organization to allow employees to make contact with customers, suppliers or any stakeholder using free or personal email accounts, especially not if confidential data is involved.

2. Urgency

It is in scammers’ best interest to carry out phishing attacks quickly. As time goes by, targets are more likely to notice that something is off and take measures to warn their colleagues, organization and third parties against suspicious emails. That is why cybercriminals come up with all sorts of pressing reasons (see examples below) to justify speedy money transfers or the disclosure of private and financial details:

  • Time-sensitive deal with a new customer
  • Breach of contract and lawsuit
  • Overdue invoice and penalty for late payments
  • Account suspension and service disruption

3. Unpolished Communications

Brands know that their reputations are on the line in every communication sent externally and spend a lot of effort perfecting messages, personalizing campaigns and checking drafts for errors. Generic greetings, grammar mistakes and bad formatting are all signals of “phishy” email messages.

4. Follow-Ups via Email Only

Fraudsters are wary of revealing too much about themselves to avoid compromising their fake identities. You can leverage that fact to spot email scams. For instance, when someone makes an unusual or urgent request, ask to follow up on the phone or face to face. Any legitimate sender will see no objection, whereas an impersonator is probably going to give excuses not to talk or meet and insist on communicating exclusively via email.

5. Odd URLs and Domains

Many email scams use external links to redirect potential victims to a fake homepage or formwhere personal and financial data is then collected. These phishing messages can look very convincing at first glance but usually exhibit one or more red flags. For example:

  • Inconsistent embedded links, where the display and destination URLs do not match
  • A domain and email address different than the one used in past brand communications
  • Shortened URLs, masking the actual destination
  • A URL name that is missing a character, e.g., http:// instead of https:// or website.com rather than website.com/

6. No Multichannel Support

Scammers find it advantageous to impersonate known entities that inspire trust and credibility in order to boost the success rates of their attacks. However, while it’s one thing to forge an email address, it’s another to mimic an entire customer support department and social media accounts.

Large organizations – and, increasingly, small and medium-sized businesses – invest heavily in customer experience and offer various options for recipients to talk to a representative to resolve doubts and answer questions. Cybercriminals, on the contrary, do not want their targets to reach out for support. If you are unsure about the source of a message, try contacting the company using official customer support channels to clarify what is happening and check whether a request for information is legitimate.

7. Doubtful Attachments

Another common phishing technique consists of including one or more malicious attachments to deceitful emails and prompting recipients to download and open them to complete a task. These files may contain viruses or other forms of malware designed to damage, alter or retrieve data, infect servers and networks or lock systems until a ransom is paid in exchange for a decryption key.

To avoid the above, beware of attachments in general, particularly from unknown senders or the following types of attachments:

  • .7z, .rar, .zip and other compressed files
  • .bat, .cmd, .exe, .hta, .jar, .js, .msi and extensions used to run code
  • .docm, .pptm and .xlsm macro-enabled documents

Three Things Your Company Needs to Ensure CyberSecurity in 2018

In 2017, ransomware became so powerful that it managed to finally make a name for itself as a business model. Ransomware as a service (RaaS) allows hackers to simply buy or sell their own ransomware for the purpose of damaging individuals or businesses.

Considering that, and the fact that all the other businesses affected by hackers, cybersecurity has become extremely important for every business today. It doesn’t matter what industry you pertain to – the reality is that hackers can access your data and sell it for a profit or perform other maleficent actions.

This is why investing in business IT solutions can help protect your company from this type of attack. Creating the right protection plan is essential to your business. Even if you believe that your business is not important enough to attack, the reality is that every organization could become a victim. Our dedicated team created a quick list of three things you need to do to keep your files safe.

Data Backup and Protection

One of the main benefits of business IT support and data protection solution is that they can keep your data safe from prying eyes. Hackers won’t have easy access to your sensitive data. Also, having a professional data backup and protection plan will make you less prone to malware and viruses. You get to save money this way, and in the end, hackers will find it more difficult to take advantage of any human errors. Plus, protecting your data will help you stay in compliance with the current laws. Use this type of service, and there will be less need to worry about the safety of your data.

Cloud Solutions

Most companies that use cloud services may be targeted by hackers. With help from a great IT support team and other dedicated services, you can help negate that issue. A dependable business technology solutions team password protects all your content, filters it and heavily monitors company information to ensure that only the authorized parties will be able to access designated files. This way everyone will get to see only what they need to.

24/7 Business IT Support

A dependable IT support team knows that cybersecurity issues can appear at any time, regardless of the hour. Services like these can bring you the best business computer services and reliable solutions in no time.

If you opt for round–the-clock IT support, you won’t have to worry about any data security issue, and the team can also help you deal with any other type of IT issues, not only security related stuff. This also ensures you that the company files are safe. A well managed IT services firm would also have heavily monitored data centers. Only authorized personnel goes into this building, which means that all your sensitive data will be stored by a professional and reliable business.

As long as there’s data online, there will always be hackers that try to steal it. Don’t let hackers take advantage of your company’s information. Invest in the best business IT solutions right now.

How to Keep Your Smart Home Safe

The concept of smart homes has become quite popular among consumers, especially due to their convenience. A smart home is equipped with several devices that are connected to the internet or intranet (internal network), to allow users remote management of different household appliances or systems.

The rapid growth of smart homes can also open up new opportunities for perpetrators to practice acts of cybercrime. Appliances in a smart home are all connected in a network. Any breach in that network can allow cybercriminals access to your home appliances, which can jeopardize your privacy or even potentially threaten your life.

Make sure you are following these steps to prevent hackers from gaining access to the network that connects to your smart home.

1) Use protected devices and appliances only

Different appliances or devices like thermostats, lighting systems and CCTV systems present in your smart home are part of a network. As a consumer, you need to make sure that each of these devices has been designed to meet certain security and safety standards. While purchasing smart devices you can ensure that they meet standards like ZigBee, Z-Wave or S2 (Security 2). Most well established brands follow these secured transmission protocols. Buying cheaper devices may save you money, but it can also expose you to cyber threats, as these devices lack the proper security protocols.

2) Never access your smart home network from a public or open Wi-Fi

One of the key features of smart home systems is that they allow you to remotely control or manage your home appliances. Since you are connecting to your home automation network over the internet, you need to avoid using any open or public Wi-Fi. These networks can have very poor security protocols and give hackers the opportunity to sneak into your home network. Methods like man in the middle (MITM) (man in the middle) enable hackers to set up fake public Wi-Fi that allows them to intercept any transmission that takes place. They may be able to see the type of data that you are sending to or receiving from your smart home.

3) Keep your smartphone secured

In a home automation system, your smartphone acts as a universal remote control; ensure that it is always locked by a passcode, touchID or facial recognition. In case your smartphone is stolen, immediately try to lock it by remote access – the “Find my iPhone” feature of iOS can be really handy in situations like this. Moreover, if you have reason to believe the security of your smartphone has been compromised, or even if you have recovered your phone after it had gone missing, reset the password of your smart home network. It is also advisable that, in such situations, after retrieving your phone you restore to factory settings.

4) Smart homes need smart password management

In a typical smart home, the appliances or devices are connected to the network via a Wi-Fi router or hub; therefore, protecting Wi-Fi is crucial. Set a strong password for your Wi-Fi network that is at least 12 characters long – and make it unique from any of your other passwords. Name your Wi-Fi network in a way that doesn’t let people know it’s your house; naming it “John’s Home,” for example, makes you an open target.

Before committing to the luxury and convenience of your smart home, you need to understand how the whole system works and how you can protect yourself from data theft and security breach. These four steps, if implemented correctly, should help you to stay safer and more secure.