<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>LinkedIn Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/linkedin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/linkedin/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 15 Apr 2021 15:52:52 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>LinkedIn Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/linkedin/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 074 Data Scraping or Data Breaches</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 16 Apr 2021 01:15:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Breaches]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Clubhouse]]></category>
		<category><![CDATA[Clubhouse Breach]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Scraping]]></category>
		<category><![CDATA[Data Scraping or Data Breaches]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Facebook breach]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[LinkedIn Breach]]></category>
		<category><![CDATA[Scraping]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2496</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 74. This week we&#8217;re going to talk about Data Scraping or Data Breaches? Why am I asking the question &#8220;Data Scraping or Data Breaches&#8221;? In recent weeks, three of the large social media companies have had lots and lots of personal data exposed online by cybercriminals. Now these social media companies&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/">#WeekendWisdom 074 Data Scraping or Data Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 74. This week we&#8217;re going to talk about Data Scraping or Data Breaches?<span id="more-2496"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2496-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4</a></video></div>
<h3>Why am I asking the question &#8220;Data Scraping or Data Breaches&#8221;?</h3>
<p>In recent weeks, three of the large social media companies have had lots and lots of personal data exposed online by cybercriminals. Now these social media companies are claiming that these were data that were scraped from their services. That this information that is already in the public domain.</p>
<h3>These may have been Data Scraping</h3>
<p>In the case of Clubhouse which had 1.3 million records exposed and LinkedIn which had 500 million records exposed. Yes all of the data that was exposed is stuff that you can see on their platforms. You can see this information very publicly on their platforms. That&#8217;s a reasonable expectation. That&#8217;s what you use these sites for.</p>
<p>But my issue here is that LinkedIn and Clubhouse should have done much more. They could prevent data being exposed and scraped like that, in such mass quantities. That stuff can be slowed down. It can be made non-economical.</p>
<p>So yes, that was data scraping, maybe not really a data breach but more should have been done.</p>
<h3>But this one is definitely a Data Breach</h3>
<p>Facebook, which had 533 million records exposed, this is a different situation. They had my mobile number and I had only given it to them for the purpose of authenticating my log on and I had set it to not expose that information to the public. My mobile number was exposed to the public. So therefore that is a data breach, simple as.</p>
<p>Facebook are being disingenuous with their claim that this was data scraping.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/">#WeekendWisdom 074 Data Scraping or Data Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4" length="34654962" type="video/mp4" />

			</item>
		<item>
		<title>Take a 2-Minute Privacy check-up.</title>
		<link>https://www.l2cybersecurity.com/take-2-minute-privacy-check/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 12 May 2017 15:47:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=649</guid>

					<description><![CDATA[<p>After last week&#8217;s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="wp-image-650 size-thumbnail alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg" alt="2 Minute Privacy Check-up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />After last week&#8217;s brief shenanigans with <a href="http://www.l2cybersecurity.com/gmail-users-phished/">GMail getting phished badly</a> and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.<span id="more-649"></span></p>
<p>Most of the big on-line services have this facility buried in their settings somewhere, but when you find them, they are really easy to go through and it can be an eye-opening exercise. I discovered on my personal GMail account, that a phone I had on loan while my own was off getting repaired was still an authorised device on my account. I wasn&#8217;t too concerned, because I myself had carried out a factory reset on that phone before I handed the loaner back in.</p>
<p>However, most people would not think to do such a thing and, while you would expect the repair shop to do it as part of their procedures, this does not necessarily make it happen &#8230; and I&#8217;m not talking about the small phone repair shops that are dotted about the place either. A friend got a loaner phone from one of the big mobile companies while her&#8217;s was sent for repair. She took a few photos one day and was browsing them that evening and she came across a few dozen photos of some people she did not recognise. She mentioned this to the shop when she collected her repaired phone. They apologised profusely, immediately did a factory reset on the loaner and showed her the completely empty device when it restarted. That was OK for her. But what about the previous user of the device. What if she knew even one of the people in those photos? What if the photos were embarrassing or worse &#8230; incriminating? <img decoding="async" src="https://www.facebook.com/images/emoji.php/v8/f15/1/28/1f914.png" alt="?" /></p>
<p>Anyway, I&#8217;ve done a Billy Connolly and wandered wildly off-topic, so back to privacy check-ups.</p>
<p>You can do these all at once, if you want, or just take 2 minutes each day over the next few days and do a privacy check-up and security/account check-up on each account. I would also recommend you do this on a desktop/laptop, as the mobile apps may not have the full set of privacy settings to be checked. Finally don&#8217;t just be looking for authorised devices, keep an eye out for Apps which are authorised on your accounts, which you may no longer use. You should really remove their access.</p>
<p>GMail &#8230; has both privacy <a href="https://myaccount.google.com/privacy">https://myaccount.google.com/privacy</a> and security <a href="https://myaccount.google.com/security">https://myaccount.google.com/security</a> check-ups</p>
<p>LinkedIn &#8230; has privacy <a href="https://www.linkedin.com/psettings/privacy">https://www.linkedin.com/psettings/privacy</a> and account <a href="https://www.linkedin.com/psettings/account">https://www.linkedin.com/psettings/account</a> settings pages.</p>
<p>FaceBook &#8230; privacy <a href="https://www.facebook.com/settings?tab=privacy">https://www.facebook.com/settings?tab=privacy</a> and security <a href="https://www.facebook.com/settings?tab=security">https://www.facebook.com/settings?tab=security</a></p>
<p>Twitter &#8230; Privacy <a href="https://twitter.com/settings/safety">https://twitter.com/settings/safety</a> and account <a href="https://twitter.com/settings/account">https://twitter.com/settings/account</a> settings</p>
<p>Other online services that you use might have something similar. Just go into their settings and search for privacy and account or security tabs and simply go through each of them.</p>
<p>You might even pop a reminder into your calendar to come back in 6 months time and review these settings again because lets face it, something will have changed.</p>
<p>And hey &#8230; Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don&#8217;t ignore that e-mail from Lynda.com</title>
		<link>https://www.l2cybersecurity.com/dont-ignore-lynda-email/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Dec 2016 11:48:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Lynda.com]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=582</guid>

					<description><![CDATA[<p>I received two e-mails in recent days from online training provider Lynda.com customer care, this is because I have had two accounts with Lynda.com in the past. Both were set-up when they had a 30 day free trial offer, which I made use of. I&#8217;m one of the 9.5 million customers/former customers of Lynda.com who have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dont-ignore-lynda-email/">Don&#8217;t ignore that e-mail from Lynda.com</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;">
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I received two e-mails in recent days from online training provider <i>Lynda.com customer care</i>, this is because I have had two accounts with Lynda.com in the past. Both were set-up when they had a 30 day free trial offer, which I made use of.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I&#8217;m one of the 9.5 million customers/former customers of Lynda.com who have been contacted by them about a breach of their data security. They state that my contact information and courses taken were compromised, however they believe my password was not compromised. Here is the text of the e-mail:</span></p>
</div>
<blockquote><p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">We recently became aware that an unauthorized third party breached a database that included some of your Lynda​.com learning data, such as contact information and courses viewed. We are informing you of this issue out of an abundance of caution.</span></p>
<p>Please know that we have no evidence that this data included your password. And while we have no evidence that your specific account was accessed or that any data has been made publicly available, ​we wanted to notify you as a precautionary measure.</p></blockquote>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">So this doesn&#8217;t sound so bad. Right?</span></p>
</div>
<p><span id="more-582"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Nope. They have my contact information, so they have my name, e-mail address and mobile phone number. That means I could be targeted for <a href="https://en.wikipedia.org/wiki/Phishing">phishing</a> or even worse <a href="https://en.wikipedia.org/wiki/Phishing#Spear_phishing">spear phishing</a>. I tried to see if I could delete my Lynda.com account, but nothing obvious jumped out at me. I must check their online help and if there is nothing there, I will be contacting their &#8220;customer care&#8221; to try to get rid of these accounts.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">There were 55,000 people who have been contacted by </span><i data-blogger-escaped-style="font-family: &quot;Helvetica Neue&quot;, Arial, Helvetica, sans-serif;">Lynda.com customer care</i><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;Helvetica Neue&quot;, Arial, Helvetica, sans-serif;"> telling them that their passwords <u data-blogger-escaped-style="font-weight: bold;">have</u> been compromised and so Lynda.com have forced a reset of their password.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I actually don&#8217;t care about my password, the hackers would be welcome to it, as that is unique to my Lynda.com account, I would not have used it anywhere else. However, to use their terms, out of an abundance of caution I have changed my passwords on the two accounts I have, to some complete gibberish that even I won&#8217;t remember. I&#8217;ve stored them in my password manager.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">So what lessons can be learnt here:</span></p>
</div>
<ol>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Don&#8217;t re-use passwords &#8230; Get <a href="http://www.l2cybersecurity.com/security-awareness-training/">training</a> from <a href="http://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> or use a password manager.</span></li>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you sign up for free trials of services, but don&#8217;t continue with them, then have your account deleted/removed after you finished.</span></li>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If they don&#8217;t allow that (they may need to hold on to your e-mail address in order to make sure you don&#8217;t sign up again and again with the same e-mail), then try to have as much other personal information as possible removed from their site (name, address, date of birth, telephone numbers, etc.)</span></li>
<li><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Again, if you cannot remove the account, then before you stop using it, set the password to something completely nonsensical and don&#8217;t bother with it ever again.</span></li>
</ol>
<p>The post <a href="https://www.l2cybersecurity.com/dont-ignore-lynda-email/">Don&#8217;t ignore that e-mail from Lynda.com</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Here is a worrying aspect of the Yahoo breach.</title>
		<link>https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Sep 2016 16:48:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=486</guid>

					<description><![CDATA[<p>Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There&#8217;s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account. Yahoo provides e-mail services to some big internet service providers (ISPs), over in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">Here is a worrying aspect of the Yahoo breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft" src="https://1.bp.blogspot.com/-8EJZw55EX-U/V-VZ9S-st4I/AAAAAAAAAZg/fyZ9OhxST109aBuR3LdTURkTZ2eoehrhwCLcB/s200/Yahoo.jpg" alt="Yahoo hacked" width="200" height="129" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There&#8217;s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Yahoo provides e-mail services to some big internet service providers (ISPs), over in the US <a href="http://att.yahoo.com/" data-blogger-escaped-target="_blank">AT&amp;T</a>, <a href="http://ca.rogers.yahoo.com/" data-blogger-escaped-target="_blank">Rogers</a> and <a href="http://login.frontier.com/webmail/">Frontier.com</a>. Over on this side of the Atlantic <a href="http://www.sky.com/">Sky</a> and <a href="http://home.bt.com/">BT</a> are large ISPs operating in Ireland and the UK. Their e-mail services are powered by Yahoo.</span></p>
</div>
<p><span id="more-486"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There are <a href="http://www.bbc.com/news/world-us-canada-37447016">reports</a> that Sky and BT are contacting their customers, so that at least should hopefully highlight to those people that, yes, you do have a Yahoo account too, it&#8217;s just by a different name.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #1</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A large amount of the Yahoo accounts will no doubt be dormant and no longer in use by their owners. I certainly had a Yahoo account quite some time ago, but I never associated it with myself (shock/horror &#8211; I lied on the Internet ?) or with any other account. The bad guys are welcome to it, as I know it can&#8217;t connect to me.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">However if you used the same user name on a Yahoo account (dormant or not) on some other accounts (GMail, Facebook, LinkedIn, Microsoft, etc.) then the Yahoo account details could be tried by the evil doers against these other services.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Of course, you will have used the same password on them all, so that&#8217;ll make their life so much easier to ruin yours. ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So the first tip is to change your Yahoo account password now. You should also change this password on all of the other online accounts that you use it on. However this time you might take the sensible decision and give every account a unique password. You can learn how to do this easily at the <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Safety Training</a> which L2 Cyber Security Solutions deliver. However if you struggle to come up with the means to do this, then you should invest in a <a href="https://en.wikipedia.org/wiki/Password_manager">Password Manager</a>. This can do the hard work for you.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #2</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">On any on-line service that you use, if it has a means to implement, what is called, Two Factor Authentication, then turn it on NOW! I cannot stress how much this improves your security position just by turning this feature on.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I go into in more detail <a href="https://www.l2cybersecurity.com/protect-online-accounts/">here</a>, but briefly, if you are using Facebook or Dropbox (to name but two, there are dozens that subscribe to this method) you can download the <a href="https://support.google.com/accounts/answer/1066447?hl=en">Google Authenticator</a> App onto your smart phone (available on <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en">Android</a> and <a href="https://itunes.apple.com/en/app/google-authenticator/id388497605?mt=8">Apple</a>). Then inside in the account security settings of your on-line service, activate the Two Factor Authentication, telling it you use Google Authenticator. It will put up a QR code on screen, which you show to the App and it will then start generating a 6 digit code that changes every 30 seconds.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So now what happens is that if you (or some evil doer) tries to sign on to your account from a different device or location, even if they have your password they will also now need the 6 digit code that is showing up on your Google Authenticator App. Without it, they get nowhere.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If the on-line service does not support Google Authenticator, then they might send you a text message instead. This is not quite as secure as the App, but it is better than nothing.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #3</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">It wasn&#8217;t just user name and passwords that were stolen, but details like date-of-birth, mobile phone number and answers to security questions.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Details like date-of-birth and mobile number are kinda hard to change, but the security questions are another concern. If you have some other on-line accounts that use the same security questions, now would be a good time to go and change these.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A much simpler solution would be to implement Two Factor Authentication, as outlined above.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Conclusion</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The internet is a wonderful but dangerous place and there are a lot of bad guys who are making a lot of money from your accounts. So &#8230;</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-53nIn9qa3cM/V-Vb_5nybnI/AAAAAAAAAZw/AWG-gOSFSwULKBlBzH57ixBKbQ0uW0J_gCLcB/s1600/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img fetchpriority="high" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-53nIn9qa3cM/V-Vb_5nybnI/AAAAAAAAAZw/AWG-gOSFSwULKBlBzH57ixBKbQ0uW0J_gCLcB/s400/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" width="400" height="266" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;"></div>
<p>The post <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">Here is a worrying aspect of the Yahoo breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protect your on-line accounts, but not with text messages.</title>
		<link>https://www.l2cybersecurity.com/protect-online-accounts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 12 Sep 2016 15:01:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=554</guid>

					<description><![CDATA[<p>As I outlined here, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of protecting yourself from the evil doers is to use, what is called, two factor authentication. If you are not doing this now, you really should be as it improves your protection massively. This is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/protect-online-accounts/">Protect your on-line accounts, but not with text messages.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As I outlined <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/" data-blogger-escaped-target="_blank">here</a>, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">protecting yourself from the evil doers is to use, what is called, two factor authentication. If you are not doing this now, you really should be as it improves your protection massively.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is where you can set your on-</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">line accounts to not only request your user ID and password (something you know) but also using your phone (something you have) by </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">way of an app or sending you a text message with a code that you enter on the site to confirm you are <b><u>you</u></b>. </span></p>
</div>
<p><span id="more-554"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you have this set-up to authenticate by a SMS Text message, then a bad guy who has access to your LinkedIn details from the </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><a href="https://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised" data-blogger-escaped-target="_blank">2012 hack</a> should not be able to access your e-mail account using the password that they have recovered from there, because as </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">soon as they try to access your e-mail account, you will be sent a text message. So you&#8217;re safe &#8230; right?</span></p>
</div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">Well, if they have your LinkedIn details, they may also have your mobile phone number (or they have it from other means). So as </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">soon as they try to access your e-mail and a text message is sent to you from your e-mail provider, they follow it up immediately </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">with a text from themselves to say somebody is trying to access your account and to reply to them with the 6 digit code that you </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">just received. If you do this, they immediately access your account and lock you out of it. You can see how this works on this </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">short video from Symantec.</span></p>
<p><iframe loading="lazy" title="SMS Phishing Scam for Email Accounts | Symantec" width="500" height="281" src="https://www.youtube.com/embed/_dj_90TnVbo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div data-blogger-escaped-style="text-align: justify;"> The three tips on that video at the end are very pertinent:</div>
<ol>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Beware of unsolicited text messages</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If unsure, check with your account provider</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Password recovery text services never require a response via text or other e-mail</span></li>
</ol>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So really, the best way to secure your account is to use an app on your smart phone like <a href="https://support.google.com/accounts/answer/1066447?hl=en" data-blogger-escaped-target="_blank">Google Authenticator</a>, <a href="https://www.twilio.com/authy" data-blogger-escaped-target="_blank">Authy</a> or <a href="https://duo.com/why-duo/why-two-factor-authentication-2fa" data-blogger-escaped-target="_blank">Duo</a>. These </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">are constantly generating random 6 digit codes which you can use to authorise your access to an account. These will work even in flight mode. So if you receive a text </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">message asking for your code, you can simply ignore it. Here&#8217;s an example from Google Authenticator:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-XIi-YThkLz8/V9a9SE62G8I/AAAAAAAAAX4/jT-34Q5rXvAct9GmAmjZBtGG7OpeJgVQgCLcB/s1600/Screenshot_2016-09-12-15-30-41.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-XIi-YThkLz8/V9a9SE62G8I/AAAAAAAAAX4/jT-34Q5rXvAct9GmAmjZBtGG7OpeJgVQgCLcB/s400/Screenshot_2016-09-12-15-30-41.png" width="225" height="400" border="0" /></a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;verdana&quot; , sans-serif;">The </span><a href="http://www.l2cybersecurity.com/security-awareness-training/" data-blogger-escaped-style="background-color: white; color: #4a4a4a; font-family: Verdana, sans-serif; text-decoration: none;" data-blogger-escaped-target="_blank">training</a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;verdana&quot; , sans-serif;"> that L2 Cyber Security Solutions delivers, will give you a better understanding of the threats that are out there and show you how you can easily protect yourself from them. </span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/protect-online-accounts/">Protect your on-line accounts, but not with text messages.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A slew of fake LinkedIn connection requests.</title>
		<link>https://www.l2cybersecurity.com/fake-linkedin-connection-attempts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 04 Jun 2016 11:46:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=520</guid>

					<description><![CDATA[<p>For somebody who normally receives a LinkedIn connection request about once a week, yesterday I suddenly received 6! Wow, am I popular or what??? Well in this case I am popular &#8230; for the scammers. Each one was a fake profile. Firstly none of them had a connection in common with any of my contacts.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/fake-linkedin-connection-attempts/">A slew of fake LinkedIn connection requests.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">For somebody who normally receives a <a href="https://www.linkedin.com/in/lynchliam">LinkedIn</a> connection request about once a week, yesterday I suddenly received 6! Wow, am I popular or what???</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">Well in this case I am popular &#8230; for the scammers. Each one was a fake profile.</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Firstly none of them had a connection in common with any of my contacts. This always makes me question why are they trying to connect with me.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I then Googled the names and companies.</span></p>
</div>
<p><span id="more-520"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The first was &#8220;Adline matter&#8221;, apparently a doctor from the photo. Google reckoned I wanted Adelaide Matter. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The next was &#8220;James Freeman, of Sailer Benefit&#8221;. Google reckoned this was a Texan who had been executed for murder earlier this year. Deeper searching on the Sailer Benefit side showed no connection with a James Freeman. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The third was a &#8220;William Parker, of Barclays&#8221;. Lots of hits here, all indicating it was a scammer. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The next one was a real person! It was &#8220;Ayesha Gadaffi, of AYG Group&#8221;, the daughter of a certain Libyan Dictator. When the company name was included in the Google search, this highlighted it as a scam account. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The fifth was again a real person. Goes by the name &#8220;Asare Akuffo, of Bank Atlantec&#8221;. It shows that he is a banker, but there was no association with Bank Atlantec. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Finally, &#8220;Hesham Abdulla Al Qassim, Vice Chariman of the Board&#8221; is also a real person, but his Real LinkedIn (which was the first search result) shows him as CEO. Ignore &amp; Report as Spam!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So folks, you should be wary of any connection request for people you do not know. It&#8217;s the same rule we should apply to receiving e-mails from strangers. Don&#8217;t accept connection requests from strangers, even if they have a common connection. If you are tempted, just spend a few extra seconds and Google them and their company or position and see what shows up.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Lets be careful out there.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/fake-linkedin-connection-attempts/">A slew of fake LinkedIn connection requests.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
