FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims

source: infosecurity-magazine.com | image: fbi.gov

 

The FBI has updated its alert about fake lawyers defrauding victims of cryptocurrency scams, adding due diligence measures to help victims.

The FBI’s Internet Crime Complaint Center (IC3) has previously warned that fraudsters were posing as lawyers from fictitious law firms and using social media and messaging services to defraud victims of cryptocurrency scams.

In this sophisticated scheme, the malicious actors target vulnerable populations, particularly the elderly, and offer to recover funds from a previous scam but instead steal personal information and sometimes money from them. Continue reading “FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims”

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

source: wired.com (contributed by Artemus founder, Bob Wallace)  |  Image: pixabay.com

 

Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics—that are sold with Securam Prologic locks.

 

About two years ago, security researchers James Rowley and Mark Omo got curious about a scandal in the world of electronic safes: Liberty Safe, which markets itself as “America’s #1 heavy-duty home and gun safe manufacturer,” had apparently given the FBI a code that allowed agents to open a criminal suspect’s safe in response to a warrant related to the January 6, 2021, invasion of the US Capitol building.

Politics aside, Rowley and Omo were taken aback to read that it was so easy for law enforcement to penetrate a locked metal box—not even an internet-connected device—that no one but the owner ought to have the code to open. “How is it possible that there’s this physical security product, and somebody else has the keys to the kingdom?” Omo asks. Continue reading “Hackers Went Looking for a Backdoor in High-Security Safes…”

AI Data Centers Are Massive, Energy-Hungry and Headed Your Way

source: cnet.com  | image: pixabay.com

 

Behind your ChatGPT and Gemini queries, there’s a land grab happening to keep up the fevered pace of gen AI’s growth. The consequences are significant.

 

From the outside, this nondescript building in Piscataway, New Jersey, looks like a standard corporate office surrounded by lookalike buildings. Even when I walk through the second set of double doors with a visitor badge slung around my neck, it still feels like I’ll soon find cubicles, water coolers and light office chatter.

Instead, it’s one brightly lit server hall after another, each with slightly different characteristics, but all with one thing in common — a constant humming of power. 

The first area I see has white tiled floors and rows of 7-foot-high server racks protected by black metal cages. Inside the cage structure, I feel cool air rushing from the floor toward the servers to prevent overheating. The wind muffles my tour guide’s voice, and I have to shout over the noise for him to hear me. 

Continue reading “AI Data Centers Are Massive, Energy-Hungry and Headed Your Way”

 

Have You Turned Off Your Virtual Oven?

sosurce: thehackernews.com  |  image: pixabay.com

 

You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and stove were definitely turned off. Maybe even circle back again to confirm the front door was properly closed. These automatic safety checks give you peace of mind because you know the unlikely but potentially dangerous consequences of forgetting – a break-in, fire, or worse.

Your external-facing IT infrastructure deserves the same methodical attention. External Attack Surface Management (EASM) and Digital Risk Protection (DRP) tools provide that same peace of mind for your digital “home,” automating the everyday safety checks that prevent costly incidents. Continue reading “Have You Turned Off Your Virtual Oven?”