<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:Helvetica;
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:inherit;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
h1
{mso-style-priority:9;
mso-style-link:"Heading 1 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:24.0pt;
font-family:"Calibri",sans-serif;
font-weight:bold;}
h2
{mso-style-priority:9;
mso-style-link:"Heading 2 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:18.0pt;
font-family:"Calibri",sans-serif;
font-weight:bold;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
span.Heading1Char
{mso-style-name:"Heading 1 Char";
mso-style-priority:9;
mso-style-link:"Heading 1";
font-family:"Calibri",sans-serif;
font-weight:bold;}
span.Heading2Char
{mso-style-name:"Heading 2 Char";
mso-style-priority:9;
mso-style-link:"Heading 2";
font-family:"Calibri",sans-serif;
font-weight:bold;}
p.breadcrumbs, li.breadcrumbs, div.breadcrumbs
{mso-style-name:breadcrumbs;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.small, li.small, div.small
{mso-style-name:small;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.desc, li.desc, div.desc
{mso-style-name:desc;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.details, li.details, div.details
{mso-style-name:details;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.published
{mso-style-name:published;}
span.vcard
{mso-style-name:vcard;}
span.name
{mso-style-name:name;}
span.title
{mso-style-name:title;}
span.EmailStyle32
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link="#0563C1" vlink="#954F72" style='word-wrap:break-word'><div class=WordSection1><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><div><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b>From:</b> tech-vi@groups.io <tech-vi@groups.io> <b>On Behalf Of </b>David Goldfield<br><b>Sent:</b> Wednesday, November 23, 2022 1:48 AM<br><b>To:</b> Tech-VI Announcement List <tech-vi@groups.io><br><b>Subject:</b> [tech-vi Announce List] >From MalwareBytes: 7 tips for safe online shopping this Black Friday and Cyber Monday<o:p></o:p></p></div></div><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>From the Tech-VI list owner: <o:p></o:p></p><p class=MsoNormal>As this article is from MalwareBytes it should not come as a surprise that they end the piece by promoting their software as a way to help protect your PC. However, the tips contained in this article are valid regardless of what security solution you use. I was a user of several MalwareBytes packages but haven’t used them since January of this year and so I can’t speak for their accessibility.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><a href="https://www.malwarebytes.com/blog/news/2022/11/7-tips-for-safe-online-shopping-this-black-friday-and-cyber-monday">Original Source</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><img border=0 width=736 height=413 style='width:7.6666in;height:4.302in' id="_x0000_i1046" src="cid:image001.png@01D8FEDD.C5EA16F0" alt="Happy online shopper"></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=breadcrumbs style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:7.5pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:9.0pt;font-family:"Helvetica",sans-serif;color:#9B9B9B;text-transform:uppercase'><a href="https://www.malwarebytes.com/blog/category/news"><span style='color:#9B9B9B'>NEWS</span></a><o:p></o:p></span></p><h1 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:30.0pt;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:30.0pt;font-family:inherit;color:black'>7 tips for safe online shopping this Black Friday and Cyber Monday<o:p></o:p></span></h1><p class=small style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:9.0pt;font-family:"Helvetica",sans-serif;color:black'>Posted: <span class=published>November 15, 2022</span> by <span class=vcard><a href="https://www.malwarebytes.com/blog/authors/metallicamvp" title="Posts by Pieter Arntz"><span style='color:#337AB7'>Pieter Arntz</span></a></span><o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Buyers ahoy, there's a shopping season ahead and several more on the horizon. Everyone's getting ready for the festivities, but unfortunately that includes scammers, phishers, identity thieves, and other assorted internet criminals.<o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Much of the Black Friday and Cyber Monday shopping will likely be done online, and many of the sales stretch over weeks, so let’s look at some tips to stay safe.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>1. If it seems too good to be true then it probably is<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Sometimes our excitement at finding something extraordinarily cheap, blinds us from the truth. If it’s too good to be true, it probably isn’t true. For example, we found this website promoted on social media that claims to sell unclaimed Amazon parcels for unbelievable prices.<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:8.0pt;margin-left:0in;line-height:11.75pt;background:white;box-sizing: border-box'><span style='color:black'><img border=0 width=1307 height=717 style='width:13.6145in;height:7.4687in' id="_x0000_i1045" src="cid:image002.png@01D8FEDD.C5EA16F0" alt="unclaimed Amazon parcels for sale"><o:p></o:p></span></p><p align=center style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;text-align:center;background:white;box-sizing: border-box'><em><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Too good to be true</span></em><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>So why shouldn’t we believe them? Despite the fact that the online store shows social media icons, the icons do not take you to this store’s social media pages. The post I followed on Facebook was a sponsored one from a different account. On the website you will find neither a valid email address nor a phone number. All put together, customers have absolutely no means to reach out to this store with questions or complaints. These are all red flags and it is prudent to look at them, especially when the offer is too good to be true.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>2. Block and block again<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>To make your online shopping more pleasant use an ad-blocker, and for the best experience combine it with a popup-blocker. Some advertisers can make it very hard to differentiate between the offers you were looking for and the ones they want you to look at. Blocking them decreases the risk of buying a pig in a poke.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>3. Beware of phishing<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>A lot of phishers will use times like these to go about their malicious business. Should you receive a link in an email, don’t simply click on it—make sure the mail has actually come from the alleged sender, even if you know the “sender” and have done business with them before. If anything feels weird to you, don't enter in your details and check with the shop directly.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>4. Careful when following links<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Whether it’s a link in an email or on social media, always treat links with a healthy amount of suspicion. It’s better to go to the website of the shop directly. Even though that still offers the possibility of being tricked by typo-squatters or hijacked Google results, those chances are a lot smaller than that of a malicious link. Also, make sure the link includes https at the beginning of the URL, so you know your data is encrypted whilst browsing or purchasing, although that does not automatically mean <a href="https://www.malwarebytes.com/blog/news/2020/11/demystifying-two-common-misconceptions-with-e-commerce-security"><span style='color:#337AB7'>the site is safe or legitimate</span></a>.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>5. Protect yourself from fraud<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Where possible, use a payment method that offers you fraud protection. US federal law limits your liability for fraudulent purchases on a credit card to just $50. But some credit card companies go the extra mile and won't hold you liable for any unauthorized purchases at all. The law also protects you if your credit card number is stolen as long as you still have your physical card. When in doubt, you can request transaction alerts—such as a text or push notification—every time the card is used, so you can be sure every purchase is one made by you.<o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Many credit cards also offer purchase protection, which allows consumers to file a claim with their issuer to receive replacement, repair or reimbursement for any eligible stolen or damaged items.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>6. Don't give out too much intel<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>During online shopping, don't provide your personal information if you don’t need to. Shopping somewhere that you don’t see yourself frequenting regularly? Why provide them with details they don’t need. A shipping address to send the items to and an email address to keep you updated about the progress is about all a shop really needs. It’s not about not trusting the shop. Data breaches happen every day and what you haven’t provided, they can’t leak.<o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>If you have to create an account, make sure you use a unique username and <a href="https://www.malwarebytes.com/blog/news/2022/10/why-almost-everything-we-told-you-about-passwords-was-wrong"><span style='color:#337AB7'>password</span></a> combination. That way, if the site does get breached, your passwords for all your other accounts will remain safe.<o:p></o:p></span></p><h2 style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:.25in;margin-left:0in;background:white;box-sizing: border-box;color:inherit'><span style='font-size:25.0pt;font-family:inherit;color:black'>7. Protect your device<o:p></o:p></span></h2><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Buying gifts online shouldn’t be so much of a hassle. So, make your shopping experience just that little bit easier by making sure your device is protected.<o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><a href="https://www.malwarebytes.com/browserguard"><span style='color:#337AB7'>Malwarebytes Browser Guard</span></a> can block third-party ads and other unwanted content, including web pages that contain malware, and in-browser cryptojackers (unwanted cryptocurrency miners).<o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>And an updated <a href="https://www.malwarebytes.com/"><span style='color:#337AB7'>anti-malware solution</span></a> on the device you use for your shopping can block malware from spying on your payments or performing other malicious activities.<o:p></o:p></span></p><div style='margin-top:15.0pt;margin-bottom:15.0pt'><div class=MsoNormal align=center style='text-align:center;background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><hr size=1 width="100%" align=center></span></div></div><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><strong><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>We don’t just report on threats—we remove them</span></strong><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href="https://www.malwarebytes.com/for-home"><span style='color:#337AB7'>downloading Malwarebytes today</span></a>.<o:p></o:p></span></p><div style='margin-top:15.0pt;margin-bottom:15.0pt'><div class=MsoNormal align=center style='text-align:center;background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><hr size=1 width="100%" align=center></span></div></div><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>COMMENTS</span></b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><div style='margin-top:15.0pt;margin-bottom:15.0pt'><div class=MsoNormal align=center style='text-align:center;background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><hr size=1 width="100%" align=center></span></div></div><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>RELATED ARTICLES</span></b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=MsoNormal style='background:white;vertical-align:top'><span style='color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/meta-contractors-ousted-after-internal-probe-catches-them-abusing-oops-tool"><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#337AB7;text-decoration:none'><img border=0 width=604 height=270 style='width:6.2916in;height:2.8125in' id="_x0000_i1044" src="cid:image003.jpg@01D8FEDD.C5EA16F0" alt="Meta contractors ousted after internal probe catches them abusing Oops tool"></span></a></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=breadcrumbs style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:7.5pt;margin-left:0in;background:white;vertical-align:middle;box-sizing: border-box;float:left'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#B3B3B3;text-transform:uppercase'><a href="https://www.malwarebytes.com/blog/category/news"><span style='color:#B3B3B3'>NEWS</span></a><o:p></o:p></span></p><h2 style='margin:0in;line-height:28.5pt;background:white;vertical-align:middle;box-sizing: border-box;color:inherit;float:left'><span style='font-family:inherit;color:black;font-weight:normal'><a href="https://www.malwarebytes.com/blog/news/2022/11/meta-contractors-ousted-after-internal-probe-catches-them-abusing-oops-tool"><span style='color:#141519'>Meta contractors ousted after internal probe catches them abusing Oops tool</span></a><o:p></o:p></span></h2><p class=desc style='mso-margin-top-alt:7.5pt;margin-right:0in;margin-bottom:0in;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>November 21, 2022 - Security guards working at Meta reportedly compromised user data via a tool called Oops, selling or trading the data to bad actors.<o:p></o:p></span></p><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/meta-contractors-ousted-after-internal-probe-catches-them-abusing-oops-tool"><span style='font-size:9.0pt;color:#004DDC'>CONTINUE READING</span></a><a href="https://www.malwarebytes.com/blog/news/2022/11/meta-contractors-ousted-after-internal-probe-catches-them-abusing-oops-tool#disqus_thread"><span style='font-size:9.0pt;color:#414042'>0 Comments</span></a><o:p></o:p></span></p><p class=MsoNormal style='background:white;vertical-align:top'><span style='color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/iranian-apt-compromises-federal-civilian-executive-branch-organization-for-cryptominer"><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#337AB7;text-decoration:none'><img border=0 width=604 height=270 style='width:6.2916in;height:2.8125in' id="_x0000_i1043" src="cid:image004.png@01D8FEDD.C5EA16F0" alt="APT broke into a federal agency using Log4Shell"></span></a></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=breadcrumbs style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:7.5pt;margin-left:0in;background:white;vertical-align:middle;box-sizing: border-box;float:left'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#B3B3B3;text-transform:uppercase'><a href="https://www.malwarebytes.com/blog/category/exploits-and-vulnerabilities"><span style='color:#B3B3B3'>EXPLOITS AND VULNERABILITIES</span></a> | <a href="https://www.malwarebytes.com/blog/category/news"><span style='color:#B3B3B3'>NEWS</span></a><o:p></o:p></span></p><h2 style='margin:0in;line-height:28.5pt;background:white;vertical-align:middle;box-sizing: border-box;color:inherit;float:left'><span style='font-family:inherit;color:black;font-weight:normal'><a href="https://www.malwarebytes.com/blog/news/2022/11/iranian-apt-compromises-federal-civilian-executive-branch-organization-for-cryptominer"><span style='color:#141519'>APT broke into a federal agency using Log4Shell</span></a><o:p></o:p></span></h2><p class=desc style='mso-margin-top-alt:7.5pt;margin-right:0in;margin-bottom:0in;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>November 18, 2022 - According to CISA, the suspected Iranian APT used the infamous Log4Shell vulnerability to...install a cryptominer.<o:p></o:p></span></p><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/iranian-apt-compromises-federal-civilian-executive-branch-organization-for-cryptominer"><span style='font-size:9.0pt;color:#004DDC'>CONTINUE READING</span></a><a href="https://www.malwarebytes.com/blog/news/2022/11/iranian-apt-compromises-federal-civilian-executive-branch-organization-for-cryptominer#disqus_thread"><span style='font-size:9.0pt;color:#414042'>0 Comments</span></a><o:p></o:p></span></p><p class=MsoNormal style='background:white;vertical-align:top'><span style='color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/repair-firms-might-be-rifling-through-your-personal-data"><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#337AB7;text-decoration:none'><img border=0 width=604 height=270 style='width:6.2916in;height:2.8125in' id="_x0000_i1042" src="cid:image005.jpg@01D8FEDD.C5EA16F0" alt="Repair firms might be rifling through your personal data"></span></a></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=breadcrumbs style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:7.5pt;margin-left:0in;background:white;vertical-align:middle;box-sizing: border-box;float:left'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#B3B3B3;text-transform:uppercase'><a href="https://www.malwarebytes.com/blog/category/news"><span style='color:#B3B3B3'>NEWS</span></a><o:p></o:p></span></p><h2 style='margin:0in;line-height:28.5pt;background:white;vertical-align:middle;box-sizing: border-box;color:inherit;float:left'><span style='font-family:inherit;color:black;font-weight:normal'><a href="https://www.malwarebytes.com/blog/news/2022/11/repair-firms-might-be-rifling-through-your-personal-data"><span style='color:#141519'>Repair firms might be rifling through your personal data</span></a><o:p></o:p></span></h2><p class=desc style='mso-margin-top-alt:7.5pt;margin-right:0in;margin-bottom:0in;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>November 17, 2022 - We take a look at research which indicates that device repair firms are not playing fair when it comes to keeping your privacy intact.<o:p></o:p></span></p><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/repair-firms-might-be-rifling-through-your-personal-data"><span style='font-size:9.0pt;color:#004DDC'>CONTINUE READING</span></a><a href="https://www.malwarebytes.com/blog/news/2022/11/repair-firms-might-be-rifling-through-your-personal-data#disqus_thread"><span style='font-size:9.0pt;color:#414042'>2 Comments</span></a><o:p></o:p></span></p><p class=MsoNormal style='background:white;vertical-align:top'><span style='color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/how-stolen-streaming-logins-result-in-torrents-of-legal-action"><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#337AB7;text-decoration:none'><img border=0 width=604 height=270 style='width:6.2916in;height:2.8125in' id="_x0000_i1041" src="cid:image006.jpg@01D8FEDD.C5EA16F0" alt="How stolen streaming logins result in torrents of legal action"></span></a></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=breadcrumbs style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:7.5pt;margin-left:0in;background:white;vertical-align:middle;box-sizing: border-box;float:left'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#B3B3B3;text-transform:uppercase'><a href="https://www.malwarebytes.com/blog/category/news"><span style='color:#B3B3B3'>NEWS</span></a><o:p></o:p></span></p><h2 style='margin:0in;line-height:28.5pt;background:white;vertical-align:middle;box-sizing: border-box;color:inherit;float:left'><span style='font-family:inherit;color:black;font-weight:normal'><a href="https://www.malwarebytes.com/blog/news/2022/11/how-stolen-streaming-logins-result-in-torrents-of-legal-action"><span style='color:#141519'>How stolen streaming logins result in torrents of legal action</span></a><o:p></o:p></span></h2><p class=desc style='mso-margin-top-alt:7.5pt;margin-right:0in;margin-bottom:0in;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>November 16, 2022 - We take a look at what one individual got up to with stolen streaming logins. It may not be quite what you were expecting.<o:p></o:p></span></p><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/how-stolen-streaming-logins-result-in-torrents-of-legal-action"><span style='font-size:9.0pt;color:#004DDC'>CONTINUE READING</span></a><a href="https://www.malwarebytes.com/blog/news/2022/11/how-stolen-streaming-logins-result-in-torrents-of-legal-action#disqus_thread"><span style='font-size:9.0pt;color:#414042'>0 Comments</span></a><o:p></o:p></span></p><p class=MsoNormal style='background:white;vertical-align:top'><span style='color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/a-week-in-security-november-7-13"><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#337AB7;text-decoration:none'><img border=0 width=604 height=270 style='width:6.2916in;height:2.8125in' id="_x0000_i1040" src="cid:image007.jpg@01D8FEDD.C5EA16F0" alt="A week in security (November 7 - 13)"></span></a></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=breadcrumbs style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:7.5pt;margin-left:0in;background:white;vertical-align:middle;box-sizing: border-box;float:left'><span style='font-size:10.5pt;font-family:"Helvetica",sans-serif;color:#B3B3B3;text-transform:uppercase'><a href="https://www.malwarebytes.com/blog/category/news"><span style='color:#B3B3B3'>NEWS</span></a><o:p></o:p></span></p><h2 style='margin:0in;line-height:28.5pt;background:white;vertical-align:middle;box-sizing: border-box;color:inherit;float:left'><span style='font-family:inherit;color:black;font-weight:normal'><a href="https://www.malwarebytes.com/blog/news/2022/11/a-week-in-security-november-7-13"><span style='color:#141519'>A week in security (November 7 - 13)</span></a><o:p></o:p></span></h2><p class=desc style='mso-margin-top-alt:7.5pt;margin-right:0in;margin-bottom:0in;margin-left:0in;background:white;box-sizing: border-box'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>November 13, 2022 - The most important and interesting computer security stories from the week of November 7, 2022.<o:p></o:p></span></p><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><a href="https://www.malwarebytes.com/blog/news/2022/11/a-week-in-security-november-7-13"><span style='font-size:9.0pt;color:#004DDC'>CONTINUE READING</span></a><a href="https://www.malwarebytes.com/blog/news/2022/11/a-week-in-security-november-7-13#disqus_thread"><span style='font-size:9.0pt;color:#414042'>0 Comments</span></a><o:p></o:p></span></p><p style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box'><b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>ABOUT THE AUTHOR</span></b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=MsoNormal style='background:white'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><img border=0 width=96 height=96 style='width:1.0in;height:1.0in' id="_x0000_i1039" src="cid:image008.png@01D8FEDD.C5EA16F0" alt=author></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=details style='margin-top:0in;background:white;box-sizing: border-box;float:none'><span class=name><b><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#333333'><a href="https://www.malwarebytes.com/blog/authors/metallicamvp" title="Posts by Pieter Arntz">Pieter Arntz</a></span></b></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><br></span><span class=title><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:#B3B3B3'>Malware Intelligence Researcher</span></span><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'><o:p></o:p></span></p><p class=desc style='mso-margin-top-alt:9.75pt;margin-right:0in;margin-bottom:9.75pt;margin-left:0in;background:white;box-sizing: border-box;float:none'><span style='font-size:12.0pt;font-family:"Helvetica",sans-serif;color:black'>Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.<o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>David Goldfield,<o:p></o:p></p><p class=MsoNormal>Blindness Assistive Technology Specialist<o:p></o:p></p><p class=MsoNormal><a href="https://www.freedomscientific.com/Training/Certification"><span style='font-size:14.0pt;font-family:"Arial",sans-serif;color:windowtext;text-decoration:none'><img border=0 width=86 height=86 style='width:.8958in;height:.8958in' id="_x0000_i1038" src="cid:image009.png@01D8FEDD.C5EA16F0" alt="JAWS Certified, 2022"></span></a><span style='font-size:14.0pt;font-family:"Arial",sans-serif'><o:p></o:p></span></p><p class=MsoNormal><a href="https://certification.nvaccess.org/">NVDA Certified Expert</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Subscribe to the Tech-VI announcement list to receive news, events and information regarding the blindness assistive technology field.<o:p></o:p></p><p class=MsoNormal>Email: <a href="mailto:tech-vi+subscribe@groups.io">tech-vi+subscribe@groups.io</a><o:p></o:p></p><p class=MsoNormal><a href="http://www.DavidGoldfield.org">www.DavidGoldfield.org</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal><span style='color:white'>_._,_._,_<o:p></o:p></span></p></div><div class=MsoNormal align=center style='text-align:center'><hr size=2 width="100%" align=center></div><p class=MsoNormal>Groups.io Links:<o:p></o:p></p><p>You receive all messages sent to this group. <o:p></o:p></p><p><a href="https://groups.io/g/tech-vi/message/3020" target="_blank">View/Reply Online (#3020)</a> | <a href="mailto:tech-vi@groups.io?subject=Re:%20%5Btech-vi%20Announce%20List%5D%20From%20MalwareBytes%3A%207%20tips%20for%20safe%20online%20shopping%20this%20Black%20Friday%20and%20Cyber%20Monday" target="_blank">Reply To Group</a> | <a href="mailto:david.goldfield@outlook.com?subject=Private:%20Re:%20%5Btech-vi%20Announce%20List%5D%20From%20MalwareBytes%3A%207%20tips%20for%20safe%20online%20shopping%20this%20Black%20Friday%20and%20Cyber%20Monday" target="_blank">Reply To Sender</a> | <a href="https://groups.io/mt/95213374/318502" target="_blank">Mute This Topic</a> | <a href="https://groups.io/g/tech-vi/post">New Topic</a><br><a href="https://groups.io/g/tech-vi/editsub/318502">Your Subscription</a> | <a href="mailto:tech-vi+owner@groups.io">Contact Group Owner</a> | <a href="https://groups.io/g/tech-vi/leave/11013341/318502/1820159643/xyzzy">Unsubscribe</a> [floza58@bellsouth.net]<o:p></o:p></p><div><p class=MsoNormal><span style='color:white'>_._,_._,_<o:p></o:p></span></p></div></div></body></html>