<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hackers Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/hackers/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sat, 01 Jun 2024 00:02:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Hackers Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/hackers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</title>
		<link>https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 25 May 2024 21:38:42 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5809</guid>

					<description><![CDATA[<p>Have you ever wondered if someone is eavesdropping on you through your phone? While it might sound like a scene from a spy movie, there are real concerns about privacy and security related to microphone access on your devices. A Real-World Example from the Workplace: Recently, a new employee at a company received a fraudulent [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/">Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Have you ever wondered if someone is eavesdropping on you through your phone? While it might sound like a scene from a spy movie, there are real concerns about privacy and security related to microphone access on your devices.</p>
<p><strong>A Real-World Example from the Workplace</strong>: Recently, a new employee at a company received a fraudulent text message on her personal phone, supposedly from the company&#8217;s president. The president had not sent any text, and the company had not stored her personal phone number. How did the threat actor know? It’s possible that a data broker linked the new employee’s private phone number with the president’s name at the new company by eavesdropping on a conversation, such as her telling a friend about her new job. Upon investigation, the employee found that some unexpected apps had access to her microphone.</p>
<p><strong>A Real-Word Family Example</strong>: Last week, a husband and wife discussed dental options for their child at the breakfast table with their phones nearby. They hadn&#8217;t typed anything into a computer or searched online, yet less than an hour later, one received a text message from a company offering dental aligners. How could this happen? An app on their phone might have accessed the microphone, listened to the conversation, and shared the information with a data broker. The data broker then provided this information to a company selling dental aligners, prompting them to send a targeted text message. Have you or someone you know had similar experiences?</p>
<p><strong>How It Happens</strong>: Some apps collect data, including audio data from a microphone, and sell it to data brokers, also known as Marketing Data Aggregation Warehouses. These brokers aggregate and sell data to various businesses, including marketing and advertising firms. These businesses then use the information to send targeted advertisements or, in the case of threat actors, perform sophisticated phishing attacks designed to extract sensitive information or commit fraud.</p>
<p><strong>Apps are supposed to request your permission</strong> to access your microphone. However, this &#8220;user&#8217;s consent&#8221; often comes from clicking &#8220;Do you agree to the privacy policy&#8221; during installation. Most users do not read these policies and agree just to use the app. Privacy policies can be vague, stating that the user allows the app to collect information and share data with third parties.</p>
<p>Several types of apps can gather information for sale to data brokers and request microphone access in their privacy policies. These include:</p>
<ul>
<li><strong>Social Media and Communication Apps:</strong> Use microphone access for features like voice messaging and video recording, sharing collected data for advertising.</li>
<li><strong>Virtual Assistants:</strong> Require microphone access for functionality, collecting voice queries and background noise for service improvement and advertising.</li>
<li><strong>Gaming Apps:</strong> Mobile games with voice chat request microphone access for communication, sharing user data for advertising.</li>
<li><strong>Productivity Apps:</strong> Note-taking and voice recorder apps request access for audio notes and transcriptions, collecting valuable user data.</li>
<li><strong>Health and Fitness Apps:</strong> Fitness trackers and health apps request microphone access for voice input, collecting sensitive health data.</li>
<li><strong>Utility Apps:</strong> Simple apps like flashlights and calculators sometimes request unnecessary permissions, including microphone access, to gather user data covertly.</li>
<li><strong>Marketing and Rewards Apps:</strong> Request location and microphone access to collect user data, which is then sold to data brokers.</li>
</ul>
<p>These apps often include clauses in their privacy policies that allow microphone data collection, which users might unknowingly grant, leading to targeted advertising and other uses by data brokers.</p>
<p>For further reading, refer to articles like &#8220;FTC Cracks Down on Mass Data Collectors&#8221; by the Federal Trade Commission.</p>
<p><strong>Protecting Your Privacy:</strong> To protect against such risks, Apple, Google, and Microsoft have all implemented ways to help ensure your microphone&#8217;s privacy even if users agree to the privacy policy. Instructions for disabling access to your mic are listed below. It’s crucial to regularly review and update app permissions on your devices, ensuring that only essential apps have access to sensitive data like the microphone.</p>
<p><strong>Beyond Annoying Ads</strong>: Threat actors can use similar tactics to perform targeted attacks and commit fraud against individuals and their companies. For instance, the fraudulent text message received by the new employee could lead to more sophisticated phishing attacks intended for extracting sensitive information, transferring money, or other financial fraud.</p>
<p><strong>Follow the instructions in the following draft memo you can send your workers and tell your family</strong>:</p>
<h3><strong>Memo to All Employees: Securing Your Microphone Privacy Settings</strong></h3>
<p>Dear Team,</p>
<p>We are committed to ensuring the privacy and security of our employees&#8217; personal and professional information. Recent reports have highlighted the risks associated with apps accessing device microphones without explicit consent, potentially leading to targeted fraud and privacy breaches.</p>
<p>To protect your privacy and our organization&#8217;s security, we ask all employees to take a few moments to review and update the microphone privacy settings on their devices. Below are step-by-step instructions for various platforms:</p>
<p><strong>For Apple Devices:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Privacy &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all applications that do not need access to your mic.</li>
</ol>
<p><strong>For Android Devices:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Type Microphone, Privacy, or Permission Manager in the search box. </strong>If you do not see the privacy settings, you might need to use a search engine or chatbot to find specific instructions for your device model and version of Android.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>For Windows:</strong></p>
<ol>
<li>Go to <strong>Settings &gt; Privacy &amp; Security &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>For Macs:</strong></p>
<ol>
<li>Click on the <strong>Apple symbol &gt; System Settings &gt; Privacy &amp; Security &gt; Microphone</strong>.</li>
<li>Turn off the microphone for all apps that do not need access to your mic.</li>
</ol>
<p><strong>Practical Steps:</strong></p>
<ul>
<li><strong>Revoke Unnecessary Access:</strong> Disable microphone access for all apps that do not need it. Allow exceptions for essential apps such as video conferencing tools and browsers if you use them for meetings. If you are uncertain, restrict access; the app will request permission if it needs access in the future.</li>
<li><strong>Test Essential Apps:</strong> Before your next meeting, verify that the apps you frequently use for video conferencing and other essential functions work correctly with the microphone settings you have configured.</li>
<li><strong>Restrict Other Permissions:</strong> While adjusting your microphone settings, you&#8217;ll see other settings. To further protect your privacy, consider restricting access to your camera, location, contacts, and other sensitive data.</li>
</ul>
<p>We live in a world where protecting our privacy is increasingly our responsibility. Threat actors are becoming more sophisticated, so it&#8217;s crucial to stay vigilant and proactive in securing our devices.</p>
<p>Thank you for your attention to this important matter. If you have any questions or need assistance, please ask.</p>
<p>(In the last sentence, you can give them more specific guidance on what to do if they have a question)</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<h6></h6>
<p>The post <a href="https://fosterinstitute.com/are-threat-actors-listening-to-your-phone-secure-your-mic-to-reduce-risks/">Are Threat Actors Listening to Your Phone? Secure Your Mic to Reduce Security Risks and Protect Your Privacy</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Hacker Profile &#8211; Who Are They?</title>
		<link>https://fosterinstitute.com/a-hacker-profile-who-are-they/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 16:58:42 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3316</guid>

					<description><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: They may be married and have a family Introverted with a close group of friends Often learned to program at a young age College educated, often in electronics, IT, or physics No social media [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I experienced a presentation by the US Secret Service last week, and they provided the common background they&#8217;ve identified in attackers: <span id="more-3316"></span></p>
<ul>
<li>They may be married and have a family</li>
<li>Introverted with a close group of friends</li>
<li>Often learned to program at a young age</li>
<li>College educated, often in electronics, IT, or physics</li>
<li>No social media accounts &#8211; to avoid drawing attention</li>
<li>Believe that soft drugs, such as marijuana, help them work</li>
</ul>
<p>Notice that the Secret Service doesn&#8217;t specify a gender.</p>
<p>Please forward this to your friends, so they know their adversaries a little bit better.</p>
<p>The post <a href="https://fosterinstitute.com/a-hacker-profile-who-are-they/">A Hacker Profile &#8211; Who Are They?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tesla Will Give a Car to a Hacker if they can Break In</title>
		<link>https://fosterinstitute.com/tesla-will-give-a-car-to-a-hacker-if-they-can-break-in/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 25 Jan 2019 20:02:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking Competition]]></category>
		<category><![CDATA[CanSecWest]]></category>
		<category><![CDATA[Car Hacking]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Hacking Competively]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Microsfot]]></category>
		<category><![CDATA[Tesla Hacking Competition]]></category>
		<category><![CDATA[VMware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2706</guid>

					<description><![CDATA[<p>Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays… $250,000 if they can hack the autopilot$100,000 if they can hack the modem or tuner$100,000 if they can hack the key fob or phone-as-a-key Microsoft, VMWare, and other companies are offering big prizes to someone [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/tesla-will-give-a-car-to-a-hacker-if-they-can-break-in/">Tesla Will Give a Car to a Hacker if they can Break In</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers will compete for prizes from Tesla. In addition to the first winner who gets the car, Tesla also pays…</p>



<p>$250,000 if they can hack the autopilot<br />$100,000 if they can hack the modem or tuner<br />$100,000 if they can hack the key fob or phone-as-a-key</p>



<p>Microsoft, VMWare, and other companies are offering big prizes to someone for breaking their security.</p>



<p>Challenges like this are an excellent way for companies to find security holes in their hardware, software, and services. Most companies offer a bounty system to pay successful attackers every day of the year.</p>



<p>If you want to go, or even compete, the event is March 20-22 in Vancouver. Visit <a href="http://CanSecWest.com">CanSecWest.com</a>.</p>
<p>The post <a href="https://fosterinstitute.com/tesla-will-give-a-car-to-a-hacker-if-they-can-break-in/">Tesla Will Give a Car to a Hacker if they can Break In</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacker Convention Starts Later This Week</title>
		<link>https://fosterinstitute.com/hacker-convention-starts-later-this-week/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 24 Jul 2017 13:00:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DEF CON]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hacking Competition]]></category>
		<category><![CDATA[Big Hacker Convention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Hacker Convention]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hackers in Vegas]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Safe Network]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Strong Network]]></category>
		<category><![CDATA[Strong Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2523</guid>

					<description><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. If you will be in Vegas, leave your laptop and phone at home – lest you end up [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program.<span id="more-2523"></span></p>
<p>If you will be in Vegas, leave your laptop and phone at home – lest you end up on the infamous wall of shame for being hacked. The website is defcon dot org</p>
<p>The post <a href="https://fosterinstitute.com/hacker-convention-starts-later-this-week/">Hacker Convention Starts Later This Week</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers Can Hack Your Phone Without Having Your Phone</title>
		<link>https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 18 Nov 2016 15:52:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[Cell Phone Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Hack]]></category>
		<category><![CDATA[Cloud Safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Phone Hack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2393</guid>

					<description><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally, some of the apps on your phone can mine all of this information and more, even [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from  your phone can be as simple as gaining access to that data in the cloud. Additionally, <span id="more-2393"></span>some of the apps on your phone can mine all of this information and more, even the amount of electricity left in your battery.</p>
<p>Gaining access to your account can provide everything from photos stored in your phone, to the passwords of Wi-Fi access points to which you&#8217;ve connected to in the past. That is very concerning.</p>
<p>When attackers know your browsing history, your email messages, your past search terms and the links you&#8217;ve clicked, they can use that information to perform very effective attacks tailored to trick you and the members in your company. With knowledge of your passwords, they can wreak all kinds of havoc.</p>
<p>Go get an idea of the kind of data that is stored in the cloud and is potentially accessible to attackers who use the right tools, see google dot com /policies/privacy/</p>
<p>Additionally, there are tools available, such as cloud explorer, that make it easy for even non-technical attackers to conveniently gain access to the sensitive information stored in your phone. </p>
<p>Please forward this to whomever is concerned about their mobile device&#8217;s security.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-can-hack-your-phone-without-having-your-phone/">Attackers Can Hack Your Phone Without Having Your Phone</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If Someone Impersonates You on Facebook</title>
		<link>https://fosterinstitute.com/if-someone-impersonates-you-on-facebook/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Oct 2016 13:00:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Online Impersonators]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Facebook guide]]></category>
		<category><![CDATA[Facebook hack]]></category>
		<category><![CDATA[Facebook help]]></category>
		<category><![CDATA[facebook security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[online impersonators]]></category>
		<category><![CDATA[report impersonators]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[social media security]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two step login]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2385</guid>

					<description><![CDATA[<p>Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you&#8230; Immediately change your password on Facebook. If [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/if-someone-impersonates-you-on-facebook/">If Someone Impersonates You on Facebook</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you&#8230;<span id="more-2385"></span></p>
<p>Immediately change your password on Facebook.</p>
<p>If you haven’t done so, and every Facebook user should do this, turn on login approvals.</p>
<p>Go to Facebook dot com slash help and find the box at the top of the page named: Ask a question. Enter these words: How do I turn on login approvals.<br />
Then follow the instructions.</p>
<p>Next, again at Facebook dot com slash help and, in the search box, enter: report an imposter account. The guide literally walks you through the process of what to do.</p>
<p>Please forward this to anyone you know who uses Facebook.</p>
<p>The post <a href="https://fosterinstitute.com/if-someone-impersonates-you-on-facebook/">If Someone Impersonates You on Facebook</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How To Know if a Password Attack Succeeded</title>
		<link>https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 07 Apr 2016 13:00:05 +0000</pubDate>
				<category><![CDATA[Account Lockout Policy]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[automated attacks]]></category>
		<category><![CDATA[business passwords]]></category>
		<category><![CDATA[company attacks]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Failed Logon]]></category>
		<category><![CDATA[failed logon attempts]]></category>
		<category><![CDATA[Guessing Passwords]]></category>
		<category><![CDATA[Guessing Usernames]]></category>
		<category><![CDATA[hacker attempts]]></category>
		<category><![CDATA[Hacker Success]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Lockout policy]]></category>
		<category><![CDATA[logon fails]]></category>
		<category><![CDATA[monitoring logons]]></category>
		<category><![CDATA[password attack]]></category>
		<category><![CDATA[password attacks]]></category>
		<category><![CDATA[Password lockout]]></category>
		<category><![CDATA[password tries]]></category>
		<category><![CDATA[PW Tries]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[username tries]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2283</guid>

					<description><![CDATA[<p>Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack… As demonstrated last week, attackers attempt to guess usernames and passwords on systems in an attempt to gain access to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/">How To Know if a Password Attack Succeeded</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, you saw an example of a list of passwords that an attacker used to attack a server more than 41,000 times. But the worst part was the server that underwent a short attack…<span id="more-2283"></span></p>
<p>As demonstrated last week, attackers attempt to guess usernames and passwords on systems in an attempt to gain access to those computers.</p>
<p>The most concerning part, since your network is already under attack, is that one or more of the attempts might have been successful.</p>
<p>Those thousands of unsuccessful login attempts on a computer are, in a way, reassuring because the attacker was having difficulty finding a combination that worked.</p>
<p>The reason that some computers have fewer attack attempts can be because an attacker successfully gained access after a smaller number of guesses.</p>
<p>This is often the case since the attacks are automated so an attacker will not usually get tired of trying. Once one of the tries is successful, then that&#8217;s when the attacker stops guessing usernames and passwords. At that point, they already have access.</p>
<p>Have your internal, or outsourced, IT Pro examine failed logon attempts and see if the usernames seem random like the list published last week. If the usernames are similar to those on that list, then that&#8217;s an indication that an attacker was attempting to gain access. If there are a small number of attempts, then that attacker may have gained access to the computer. </p>
<p>Now that’s concerning.</p>
<p>Please forward this to your friends and associates so that they can be more aware of how to protect the security of their organization.</p>
<p>The post <a href="https://fosterinstitute.com/how-to-know-if-a-password-attack-succeeded/">How To Know if a Password Attack Succeeded</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>No Flash Attacks After June 30</title>
		<link>https://fosterinstitute.com/no-flash-attacks-after-june-30/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 19 Feb 2016 13:00:18 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[flash content]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[organization security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[website security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2259</guid>

					<description><![CDATA[<p>Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically. Flash is a tool used on web-sites to, among other things, play videos. When people visit websites, they can be [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/no-flash-attacks-after-june-30/">No Flash Attacks After June 30</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically.<span id="more-2259"></span></p>
<p>Flash is a tool used on web-sites to, among other things, play videos. </p>
<p>When people visit websites, they can be vulnerable to what is referred to as a drive by download. Just by visiting a site, even a legitimate site, their computer may be exposed to an attack. </p>
<p>That attack can happen via a Flash video within an advertisement that was surreptitiously posted by an attacker.</p>
<p>It is always a good idea to use “click to play” functionality that prevents Flash content from running automatically.</p>
<p>Now, when Google stops accepting advertisements with Flash content, that will significantly diminish the Flash vector of attack. </p>
<p>The post <a href="https://fosterinstitute.com/no-flash-attacks-after-june-30/">No Flash Attacks After June 30</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>This Hacker Tells All</title>
		<link>https://fosterinstitute.com/this-hacker-tells-all/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 08 Dec 2015 17:30:14 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacker Insight]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[cnn]]></category>
		<category><![CDATA[cnn hacker]]></category>
		<category><![CDATA[cnn money]]></category>
		<category><![CDATA[credit card hack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hacker insight]]></category>
		<category><![CDATA[hacker point of view]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2232</guid>

					<description><![CDATA[<p>CNN Money just published an insightful interview with a hacker. You may find it interesting. Read the interview by entering this search phrase into Google: My hack stole your credit card site:money.cnn.com Forward this to your friends who want to discover this hacker&#8217;s point of view on attacking tens of thousands of companies&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/this-hacker-tells-all/">This Hacker Tells All</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CNN Money just published an insightful interview with a hacker. You may find it interesting. </p>
<p>Read the interview by entering this search phrase into Google:</p>
<p>My hack stole your credit card site:money.cnn.com</p>
<p>Forward this to your friends who want to discover this hacker&#8217;s point of view on attacking tens of thousands of companies&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/this-hacker-tells-all/">This Hacker Tells All</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacking Easier than Protection</title>
		<link>https://fosterinstitute.com/hacking-easier-than-protection/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 27 Oct 2015 14:48:39 +0000</pubDate>
				<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[cyber protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT knowledge]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[organization security]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2190</guid>

					<description><![CDATA[<p>The shocking truth: In some ways, it is easier to hack systems than it is to protect them. There are many automated tools that greatly simplify the art of hacking yet it often takes someone with IT knowledge to protect a system. You will have to find thousands of ways to protect against, but an [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/hacking-easier-than-protection/">Hacking Easier than Protection</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The shocking truth: In some ways, it is easier to hack systems than it is to protect them. There are many automated tools that greatly simplify the art of hacking <span id="more-2190"></span>yet it often takes someone with IT knowledge to protect a system. You will have to find thousands of ways to protect against, but an attacker only needs to find one way in.</p>
<p>Help protect yourself at the foundation: First, discuss and determine how aggressive you want to be with your patches – and get them applied. Second, be sure to make users something other than local administrators.</p>
<p>The post <a href="https://fosterinstitute.com/hacking-easier-than-protection/">Hacking Easier than Protection</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
