This news from our NRO Anti-Fraud Group.
Read the related stories here:
https://www.washingtonpost.com/technology/2025/06/06/meta-privacy-facebook-instagram/
This news from our NRO Anti-Fraud Group.
Read the related stories here:
https://www.washingtonpost.com/technology/2025/06/06/meta-privacy-facebook-instagram/
Cyber Security SIG has reported many healthcare data leaks and theft.
Many recent posts from Sun City residents posting about phone calls and other attempts to contact residents with spoofed caller id or email addresses from past healthcare providers.
During my recent hospital stay the staff reported many recent reports of past patients calling to verify their recent communications.
We only answer from our contacts lists. The spoofed caller ID might be in your contacts.
CONSIDER any attempts to verify or give personal information from a healthcare provider may be using information stolen in past data leaks and fake caller ID or email.
BE AWARE
A massive 1.2 billion user record database was scraped from the Meta-owned Facebook by abusing one of the social media platform‘s application programming interfaces (APIs), attackers claim. Meanwhile, Meta did not deny the scrape taking place.
The API (Application Programming Interface) is how Meta (Facebook's owner company) would sell access to their massive data collection to data users have given and data Meta has collected or purchased. This type of data collection was done by "scraping".
Scraping is collecting data via APIs.
Attackers claim this is not old data offered on hacker forums, but new data. Preliminary analysis of a portion of the records indicate this is new data.
Facebook/Meta is not denied "scrapping" is occurring bit claims it has been addressing limiting scrapping.
A cyber research team analysed a sample and reported the records contain:
User IDs, names, email addresses, usernames, phone numbers, locations, birthdates, genders, and other.
The attacker's claim is still unverified.
Similar attacks against Shopify, GoDaddy, Wix, and OpenAI are reported.
A smaller data leak from Meta in 2021 of 50 million users was reported and fined by the European Union's Irish Data Protection Commission.
If confirmed Facebook user's data is copied. Quitting Facebook will not remove the copied data.
Be aware. Awareness, Preparedness, Understanding.
Ask Anything – In-Person Presentation
Date: May 21,
2025 Time: 3:00 PM – 4:00 PM Location:
Activities Center Annex
Join us for another in-person presentation for Computer
Club members! This recurring session is designed as an open "Ask
Anything" discussion, where attendees bring their questions, share
insights, and contribute valuable information. As always, key takeaways will be
recorded and added to the Computer Club’s Vimeo library for future
reference.
However, as participation has dwindled over time, this
month’s session takes a bold approach:
“I Am Safe – Prove Me Wrong”
Are you truly secure
in today’s digital landscape? Let’s challenge that assumption!
Inspired by four major recent events, we’ll dive into
discussions on:
If you think you're secure—prove it. If you have
doubts—let’s talk about it.
This session promises to be thought-provoking, interactive,
and with valuable insights.
Apple updates to most platforms today May 12, 2025.
iOS 18.5, iPadOS 18.5, macOS Sequoia 15.5, watchOS 11.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6 and more.
This update has fixed for 30 plus security vulnerabilities. Fixes for Bluetooth, FaceTime, Call History, CoreAudio, AppleJPEG, and a fix for Apple iPhone 16e C1 modem's vulnerability that could allow an attacker in a privileged network position to intercept network traffic.
This update also added some features:
A day with out any phishing lures is getting to be a rarity.
We know to check the domain address. Attacker know this
so they are now using more common domain names.
Dot com with an appendage is now common.
.com-track .com-toll .com-paypal are a few examples.
Also a few Chinese top level domains like .TOP, .CYOU, .XIN
are in use for phishing - looking for victims to click-a-link.
The effort to lure you is increasing. Please increase your resistance and awareness.
iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1 updates released today April 17, 2015.
These update address two vulnerabilities actively being exploited.
Several minor bug fixes.
Check the settings for automatically applying software updates
(Apple set this a the default in iOS 18.4) to be the setting you wish.
Also check the default for Apple Intelligence.
As anticipated Apple released updates to current systems today.
iOS 18.4: Introduced Priority Notifications, new emojis, expanded language support for Apple Intelligence, and a dedicated Apple Vision Pro app
iPadOS 18.4: Similar updates as iOS 18.4, tailored for iPads.
macOS Sequoia 15.4: Added new Mail features, language support for Apple Intelligence, and Genmoji customization.
AirPods Firmware Update (Version 7E93): Available for AirPods Pro 2 and AirPods 4, focusing on bug fixes and improvements
watchOS 11.4: Updates for Apple Watch users, including enhanced features.
visionOS 2.4: Updates for Apple Vision Pro users.
In addition several older updates are available.
These updates focus on security, performance, and compatibility improvements for older hardware
iOS 15.8.4: Available for devices like iPhone 6s, 6s Plus, iPhone 7, 7 Plus, and the second-generation iPhone SE.
iOS 16.7.11: Supports iPhone 8, 8 Plus, and iPhone X.
iPadOS 15.8.4: For iPad mini 4 and iPad Air 2.
iPadOS 16.7.11: Supports the 9.7-inch iPad Pro, first-generation 12.9-inch iPad Pro, and iPad Gen 5.
iPadOS 17.7.6: For the second-generation 12.9-inch iPad Pro, 10.5-inch iPad Pro, and iPad 6.
As with most Apple updates, security fixes are included.
145 vulnerabilities
Google released an out-of-band security update to the Chrome browser today to address an exploit used in Russian espionage attacks.
"incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a collection of runtime libraries that provide a platform-agnostic mechanism for inter-process communication (IPC).
Tracked as CVE-2025-2783 the fix is in Chrome version 134.0.6998.177/.178 for windows.
I note several Chromium based browsers had updates available for their browsers this am. Might be good to check your chromium based browsers today before using.
Apple recently released several software updates across its devices. Here are the highlights:
iOS 18.3.2 and iPadOS 18.3.2: These updates include important bug fixes and security enhancements.
macOS Sequoia 15.3.2: This update focuses on security improvements.
watchOS 11.3.1: Available for Apple Watch Series 6 and later, this update addresses security issues.
tvOS 18.3.1: This update is for Apple TV 4K (3rd generation) and includes minor fixes.
visionOS 2.3.2: Designed for the Apple Vision Pro, this update also focuses on security.
https://www.youtube.com/watch?v=nGJehZIkASU&ab_channel=CalBarton
Do Not Say "Yes" Do NOT say/respond with No either!
Information from many stealer logs totaling 1.5TB containing 33 billion records.
Thus 494 million unique website and email pairs.
284 million unique email addresses
244 million passwords not seen before added to 199 million already leaked.
The major crime forum cited: ALIEN TXTBASE.
To check for your information/password anonymously:
https://haveibeenpwned.com/Passwords
To check Have I Been Pwned:
https://haveibeenpwned.com/
PLEASE Consider Multi Factor Authentication, Passkeys, Authenticators, Hardware keys, Passphrases, increased monitoring of all your sensitive accounts.
Cyber Security SIG Seminars:
Passwords, Passkeys, and more
After Actions Frauds, Scams, IDentity Theft
Removed the ability to downgrade from iOS 18.3.1 to 18.3
Google has warned of 50 cyber security flaws fixed in the February 2025 Android security update.
https://source.android.com/docs/security/bulletin/2025-02-01
Google Pixel phones should show the update available.
Other manufacturers will offer the update later if the Android device is capable of the update.
Microsoft released patches/fixes for 63 vulnerabilities for the February 11 patch Tuesday.
A total of 141 vulnerabilities, 4 critical, 2 currently being exploited.
This should indicate the potential for significant impact if exploited.
Updates to iOS 18.3.1, iPadOS 18.3.1, macOS 15.3.1, tvOS 18.3.1, watchOS 11.3.1, and others likely to follow.
Updates to iOS 17, macOS 14, and macOS 13 released as well.
This update addresses security vulnerabilities in USB restricted mode and other vulnerabilities. Apple does not provide much detail on the vulnerabilities addressed, which might indicate the severity of the vulnerabilities.
Apple updated most of its software products January 27, 2025.
Updates: iOS 18.3, iPadOS 18.3, macOS 15.3, watchOS 11.3, tvOS 18.3, HomePod 18.3, visionOS 2.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3, iPad17.7.4
With this update Apple Intelligence is On by default for supported devices.
To disable Apple Intelligence on iOS 18.3, iPadOS 18.3, and macOS 15.3 Settings > Apple Intelligence & Siri then toggle Apple Intelligence.
This update also addresses several security flaws, including a 0-day actively being exploited in the wild. Other security issues include five security issues in AirPlay, 3 vulnerabilities in CoreAudio. A total of 29 vulnerabilities including WebKit the engine that underpins the Safari browser.
BE AWARE
Many cheap flash and SSD drives lie about their capacity.
Not malicious lies, just that the semiconductor cells may not have passed all quality control.
This was covered in the January 6, 2025 Cyber Security presentation recording.
The slides concerning this issue:
Updates to iOS 18.2.1 and iPadOS 18.2.1
DoubleClickjacking is a sophisticated form of clickjacking that exploits a double-click sequence to bypass existing security measures. Here's a brief overview of how it works and why it's concerning:
Initial Setup: The attacker creates a website with a button that opens a new window.
Prompting Double-Click: When the user clicks the button, a new window opens, prompting the user to double-click.
Manipulating Windows: During the double-click sequence, the attacker manipulates the timing and event sequence to replace or close the top-level browser window.
Unauthorized Actions: The second click unknowingly authorizes a malicious action, such as granting access to sensitive information or authorizing a transaction.
DoubleClickjacking is particularly dangerous because it can bypass modern web browsers' clickjacking protections by exploiting the brief interval between clicks. This makes it difficult to detect and prevent, leaving many online platforms vulnerable
Account Takeovers: Attackers can take over user accounts by authorizing malicious applications.
Unauthorized Actions: Users may inadvertently change critical account settings or initiate financial transactions.
Platforms Affected: Major websites relying on OAuth for account authorization, such as Salesforce, Slack, and Shopify, are vulnerable to this attack.