<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="2" pageSize="10" timestamp="Thu, 30 Apr 2026 03:25:16 -0400" url="https://beta.my.umbc.edu/groups/bethekey/posts.xml?mode=activity">
<NewsItem contentIssues="false" id="85396" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/85396">
<Title>Hacker Posing as Graduate Program Director - Phishing Scam</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send this email out to students, or other faculty and staff; compromising their safety.</p><p>This phishing email content is as follows:</p><p>“From: <a href="mailto:heperezufl.edu@gmail.com">heperezufl.edu@gmail.com</a>&gt;</p><p>Hello. Are you available?</p><p>Please, I need your assistance urgently</p><p>Dr. Theodosia Gougousi</p><p>Professor</p>
    <p>Graduate Program Director </p>
    <p>Department of Physics</p>
    <p>University of Maryland, Baltimore County</p>
    <p>Office:</p>
    <p>Physics”</p><p>There are many characteristics that lend to this email being considered a phishing email; for example, the vague nature of the email content, coupled with the unknown and suspicious sender. </p>
    <p>However, the biggest red flag here is the hacker posing as a trusted entity. Here the hacker uses a specific form of phishing known as spear phishing to target specific members of the Physics Department. Hackers often gather information about organizations in order to make their phishing scams more personal and believable. Here, the hacker impersonates the Graduate Program Director in order to target staff within this department with the intention that they’d reveal confidential information. </p><p>If you receive this email, please be aware of its malicious nature and do NOT reply to it. Replying to this email could further engage the hacker in hopes that you’ll reveal sensitive information such as your location; which will compromise your safety.</p><p>The DoIT security group is fully aware of this phishing email and is currently working on fixing the issue. </p><p>If you receive this email or one with related content, please forward it to <span><em><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a> </em>with full headers (directions here:<em> </em></span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo">https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</a>) delete the email immediately.  If you feel your information or safety has been violated in any way, you are encouraged to call UMBC Police at (410) 455-5555.  </p><p>For more information regarding phishing and spam FAQs, please see the</p>
    <p><em>PHISHING/SPAM FAQS </em>section of <em>itsecurity.umbc.edu.</em></p></div>
]]>
</Body>
<Summary>Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/85396/guest@my.umbc.edu/3bf03328889eaef29a9716630544947e/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Jul 2019 10:56:41 -0400</PostedAt>
<EditAt>Mon, 15 Jul 2019 11:29:34 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="84980" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/84980">
<Title>"Department Admin" Phishing Scam</Title>
<Body>
<![CDATA[
    <div class="html-content">
    
    
    <p>This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows:</p>
    <p><br></p>
    <p>“From: UMBC <a href="mailto:noreply@umbc.edu">noreply@umbc.edu</a> <a href="mailto:ctirrell@tds.net">ctirrell@tds.net</a> &lt;<a href="mailto:ctirrell@tds.net">ctirrell@tds.net</a>&gt;<br>
    Date: Thu, Jun 13, 2019 at 6:35 PM<br>
    Subject: UMBC<br>
    To:<span> </span></p>
    <p><br>
    Greetings.<br>
    <br>
    A private message has been sent to you by the Admin department. Click <a href="hxxps://www.umbc.edu/">hxxps://www.umbc.edu/</a> and view your message.<br>
    <br>
    Sign.<br>
    HEAD of the department”</p>
    <p>(<em>This link has been edited so that in longer points to the suspicious web page</em>)</p>
    <p> </p>
    <p>There are many characteristics that lend to this email being considered a phishing email; for example, the vague nature of the email content, coupled with the suspicious source domain and ambiguous signature are red flags when receiving unsolicited emails. In addition to this, hackers often gather information about organizations in order to make their phishing scams more personal and believable. This phishing email in particular was targeted at UMBC faculty and staff where the content of the email presented as being from a trusted entity (head of the department); something phishers often do to scam victims into offering sensitive information, or clicking on malicious links.</p>
    <p><br></p>
    <p>If you receive this email, please be aware of its malicious nature and do not click on the link as it points to an unverified web page. The DoIT security group is fully aware of this phishing email and is currently working on fixing the issue.<span> </span></p>
    <p><br></p>
    <p>If you receive this email or one with related content, please forward it to <a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span><em>security@umbc.edu</em></span></a>and delete the email immediately.  If you feel your information has been violated in any way, you are encouraged to call UMBC Police at (410) 455-5555.  </p>
    <p><br></p>
    <p>For more information regarding phishing and spam FAQs, please see the</p>
    <p><em>PHISHING/SPAM FAQS </em>section of <em>itsecurity.umbc.edu.</em></p></div>
]]>
</Body>
<Summary>This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows:       “From: UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84980/guest@my.umbc.edu/b42c08767885e65d3571283ddc21e2b5/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 14 Jun 2019 11:45:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="84745" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/84745">
<Title>"Part-Time Job Opportunity" Phishing Scam</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows:</p>
    <p><br></p>
    <p>“From: <strong>Guthrie, Melinna</strong> &lt;<a href="mailto:Melinna.Guthrie@stonybrookmedicine.edu">Melinna.Guthrie@stonybrookmedicine.edu</a>&gt;</p>
    <p>Date: Fri, May 24, 2019 at 8:48 AM</p>
    <p>Subject: EARN MORE /PART TIIME JOB OPPORTUNITY</p>
    <p>To:<span> </span></p>
    <p><span> </span>       Customer Impact Services, secret survey company is currently hiring people from all over USA/CANADA to visit local stores as a shopper and test customer service professionalism while you earn commission of $300 flat on each visit which does not take more than an hour.</p>
    <p><span> </span></p>
    <p>You will be given funds to visit a store and pretend as a normal customer while you make purchases and take note of the quality of service as well as environment after which you will give a short report or feed back to the company for business development and customer service improvement decisions via email and earn your commission of $300 per visit.Usually, you will have 2 visits in a week and make $600 or more in a week. I am giving assurance over the legitimacy of this company.</p>
    <p><br></p>
    <p>Note:</p>
    <p>Only local stores are given, no traveling required</p>
    <p>You do not have to pay any money to begin, you'll rather be making money from home</p>
    <p>No rigorous process in registering and commencement of assignment(s)</p>
    <p>1) Shopper take personal satisfaction in watching service levels rise knowing that they played an instrumental part in that improvement.</p>
    <p><span> </span></p>
    <p>2) Shopper know the importance of following directions, they read and follow each client's evaluation criteria to the letter.</p>
    <p>**To register</p>
    <p>[&lt;<a href="hxxps://docs[.]google[.]com/forms/d/1wab3UlNppQepch_ApuXxGYyJWIa6mwCrOthbe0nThnI&amp;gt">hxxps://docs[.]google[.]com/forms/d/1wab3UlNppQepch_ApuXxGYyJWIa6mwCrOthbe0nThnI&gt</a>;]”</p>
    <p><br></p>
    <p>This phishing email is a particularly malicious one owing to number of factors; these include the professional format and grammar, the believable content of the email, as well as the presence of apparently legitimate links and source address. The DoIT security group is aware of the phishing scam and is currently investigating the issue.</p>
    <p>Due to the fact that the links contained within the email are google docs, we are unable to block or report them to google as malicious content. With that in mind, we ask that if you receive this email, please forward it to <a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span><em>security@umbc.edu</em></span></a><em>, </em>and to treat it as a malicious phishing attack. In order to mitigate potential damages, under no circumstances are users encouraged to click on the link or follow any instructions contained within it; upon receipt of the email please delete it immediately. If you have already done so and feel your personal information has been compromised in any way, please contact UMBC Police at <em>(410) 455-5555.<span> </span></em></p>
    <p>For more information regarding phishing and spam FAQs, please see the</p>
    <p><em>PHISHING/SPAM FAQS </em>section of <a href="mailto:itsecurity@umbc.edu" rel="nofollow external" class="bo"><span><em>itsecurity.umbc.edu</em></span></a><span><em>.</em></span></p><p><br></p><p><em><u>**This link has been altered so that it is unable to be clicked and directed to a malicious website or download any malicious software to your machine.</u></em></p></div>
]]>
</Body>
<Summary>Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows:       “From: Guthrie, Melinna...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/84745/guest@my.umbc.edu/3ada3e12c6974fe0fd1076536de76b76/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>8</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 24 May 2019 13:00:51 -0400</PostedAt>
<EditAt>Fri, 14 Jun 2019 11:47:58 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="83411" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/83411">
<Title>Recent Phishing Attempts At UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making sure our personal information stays secure.  One issue you must be aware of is the phishing that many accounts have encountered.</span></p><br><p><span>Phishing is the use of deception to acquire sensitive information from a person. One strategy of this is where hackers create fake emails to connect to a number of users. This strategy is very common, and surprisingly many users fall into this trap simply for lack of knowledge. Phishing is very threatening because when it is successful, cybercriminals may gain access to your personal information and potentially stealing money. This could result in financial loss.</span></p><br><p><span>DoIT has recently been notified by several users that they have received what appear to be phishing attempts. These messages may demand the user to pay a ransom to prevent the release of potentially damaging information (a process known as sexploitation, from sexual exploitation), purchase illegitimate computer software to ensure system stability, or ask if the user is available to purchase gift cards.  These messages are coming from fake email accounts pretending to be supervisors, admins, staff members, or other well-known people. If you receive an email that is from a high-profile or an authoritative person at UMBC, please be alert and make sure the email is from an authentic source. </span></p><br><p><span> If you receive an email that is not from a umbc.edu account, please be aware that this email can potentially be a phishing attempt. You can verify whether or not the message is authentic by checking the email address. Some of the phishing emails that have been reported came from “my.com” and “</span><a href="mailto:umbc.edu@gmail.com" rel="nofollow external" class="bo"><span>umbc.edu@gmail.com</span></a><span>” accounts. Another strategy is seeing what they are asking for. Phishing messages tend to demand for money in unusual circumstances. Also, it is valuable to analyze the “from,” “to,” “date,” and “subject” line of the email. If some or all of these components seem to be illogical,  you can send a message to </span><a href="mailto:secuirty@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and they will assist you to finalize the emails legitimacy. </span></p><br><p><span>DoIT is currently working on this issue and has notified the site owner whenever a phishing email has been reported. If you see an email that does not seem to be authentic, take a step back, slow down, stay focused, and think before you go any further with the suspicious email and respond accordingly. </span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83411/guest@my.umbc.edu/80ce9f68de651ef1ffba3c42a233aece/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 03 Apr 2019 10:58:36 -0400</PostedAt>
<EditAt>Tue, 30 Apr 2019 15:56:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81102" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/81102">
<Title>Backing Up Data</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>What is
    <strong>Backup?</strong></span></p>
    
    <p><strong><span>Backup </span></strong><span>is for
    recovery from hardware failure or recent data corruption or loss.</span></p>
    
    <p><span>Why <strong>Backup</strong> is needed?<strong></strong></span></p>
    
    <p><span>A
    Backup is copy of your data that is made in order to protect against loss of
    that data. Typically, backups are made on a regular basis to a time schedule or
    when the original data should be updated. Usually original data is not deleted,
    but older backups are often deleted in favor of newer ones.</span></p>
    
    <p><strong><span>There
    are various ways to backing up data</span></strong></p>
    
    <p><span>1.Keep
    it in the cloud</span></p>
    
    <p><span>2. Save
    it to an external Hard Drive</span></p>
    
    <p><span>3.Burn
    it at a CD, DVD, or Blue- ray Disc</span></p>
    
    <p><span>4. Put
    it on a USB Flash Drive</span></p>
    
    <p><span>Usually
    Desktop computers, VMs, and mobile devices are all commonly backed up. Backups
    can include data, OS and application files, or a combination of these according
    to the backup methodology and purpose.</span></p>
    
    <p><span>The
    goal of a backup is to make a copy of anything in current use that can’t afford
    to be lost. A backup of a desktop or mobile device might include just the user
    data so that a previous version of a data can be recovered if necessary.</span></p>
    
    <p><span>In the case
    of a </span><a href="https://www.backblaze.com/blog/complete-guide-ransomware/l" rel="nofollow external" class="bo"><span>ransomware attack</span></a><span>, a solid
    backup strategy can mean the difference between being able to restore a
    compromised system and having to pay a ransom in the vague hopes of getting a
    decryption key to obtain access to files that are no longer available because
    they were encrypted by the attacker.</span></p>
    
    <p><span>Backups can
    have additional uses. A user might go to a backup to retrieve an earlier
    version of a file because it contains something no longer in the current file,
    or, as is possible with some backup services such as <a href="https://www.backblaze.com/cloud-backup.html" rel="nofollow external" class="bo"><span>Backblaze
    Backup</span></a>, to share a file with a colleague or other person.</span></p>
    
    <p><span>In my
    opinion, Cloud storage is considered as most convenient and flexible data
    backup.</span></p>
    
    <p><span>There are
    some versions of cloud storage: iCloud, Google Drive, One Drive and Dropbox.</span></p>
    
    </div>
]]>
</Body>
<Summary>What is Backup?    Backup is for recovery from hardware failure or recent data corruption or loss.    Why Backup is needed?    A Backup is copy of your data that is made in order to protect...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81102/guest@my.umbc.edu/15e197df3871f0bc1db63ba9c81a13ca/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xxlarge.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xlarge.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/large.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/medium.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/small.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xsmall.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xxsmall.jpg?1545150947</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Dec 2018 11:33:44 -0500</PostedAt>
<EditAt>Tue, 18 Dec 2018 11:36:10 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="80950" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/80950">
<Title>Hotspots and Public Wi-Fi</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Public Wi Fi is famous with its easily availability and free
    access. Any person with their computer or other devices can access Public Wi
    -Fi. Public Wi -Fi could be found in convenient places such as universities,
    libraries, airports, coffee shops and hotels. In the case when you connect to Public
    Wi -Fi there is a threat that someone might access the data you are sending to
    your colleague or boss.</span></p>
    
    <p><span>To protect your data while we are using Public Wi-Fi, send
    your information to only to sites that are trusted and fully encrypted, and
    avoid using mobile apps that require personal and financial information.</span></p>
    
    <p><span>Regardless what we are doing connecting to Public Wi -Fi
    considered incredibly dangerous. There are some suggestions while you are
    connected to Public Wi – Fi.</span></p><ul><li><span>Do not touch any of your personally identifiable information (PII)</span></li><li><span>Use virtual private networks (VPN) instead</span></li><li><span>Turn of sharing</span></li></ul><div><span>Here are some useful tips from internet security experts:</span></div><div><span><br></span></div>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Be aware</span></strong><span><br>
    Public Wi-Fi is inherently insecure — so be cautious. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Remember —
    any device could be at risk</span></strong><span><br>
    Laptops, </span><a href="https://usa.kaspersky.com/resource-center/threats/smartphones" rel="nofollow external" class="bo"><span>smartphones</span></a><span> and
    tablets are all susceptible to the wireless security risks. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Treat all
    Wi-Fi links with suspicion</span></strong><span><br>
    Don’t just assume that the Wi-Fi link is legitimate. It could
    be a bogus link that has been set
    up by a cybercriminal that’s trying to capture valuable,
    personal information from unsuspecting users. Question everything — and
    don’t connect to an unknown or unrecognised wireless access
    point. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Try
    to verify it’s a legitimate wireless connection</span></strong><span><br>
    Some bogus links — that have been set up by malicious
    users — will have a connection name that’s deliberately similar
    to the coffee shop, hotel or venue that’s offering free Wi-Fi.
    If you can speak with an employee at the location that’s providing
    the public Wi-Fi connection, ask for information about their legitimate Wi-Fi
    access point — such as the connection’s name and IP
    address. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Use a VPN
    (virtual private network)</span></strong><span><br>
    By using a VPN when you connect to a public Wi-Fi network,
    you’ll effectively be using a ‘private tunnel’ that encrypts all
    of your data that passes through the network. This can help
    to prevent cybercriminals — that are lurking on the
    network — from intercepting your data. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Avoid using
    specific types of website</span></strong><span><br>
    It’s a good idea to avoid logging into websites where there’s
    a chance that cybercriminals could capture your identity, passwords
    or personal information — such as social networking sites,
    online banking services or any websites that store your credit card
    information. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Consider using
    your mobile phone</span></strong><span><br>
    If you need to access any websites that store or require the
    input of any sensitive information — including social
    networking, </span><a href="https://usa.kaspersky.com/resource-center/preemptive-safety/online-shopping" rel="nofollow external" class="bo"><span>online shopping</span></a><span> and
    online banking sites — it may be worthwhile accessing them via
    your mobile phone network, instead of the public Wi-Fi connection. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Protect your
    device against cyberattacks</span></strong><span><br>
    Make sure all of your devices are protected by a  </span><a href="https://usa.kaspersky.com/resource-center/preemptive-safety/antivirus-choices" rel="nofollow external" class="bo"><span>rigorous anti-malware and security solution</span></a><span>  — and ensure
    that it’s updated as regularly as possible. <br>
    <br>
    </span></p>
    
    <p><span> </span></p>
    
    </div>
]]>
</Body>
<Summary>Public Wi Fi is famous with its easily availability and free access. Any person with their computer or other devices can access Public Wi -Fi. Public Wi -Fi could be found in convenient places...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80950/guest@my.umbc.edu/f135b803f0cbdcd47450ef62a80ec3fb/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>6</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 10 Dec 2018 10:48:33 -0500</PostedAt>
<EditAt>Mon, 10 Dec 2018 10:50:36 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="80102" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/80102">
<Title>Social Engineering</Title>
<Body>
<![CDATA[
    <div class="html-content"><p> <strong><span>Definition of Social Engineering.</span></strong></p>
    
    <p>In social engineering, a cybercriminal is basically relying
    on social activities (and interactions) of human beings to collect information
    by tricking them. For example, asking people to open a phishing email (with attached
    malware) and thus breaking standard practice of an organization related to the
    best practices for minimizing risks. Social engineering often involves human
    socialization and interaction rather than hacking a network. The criminals are
    basically con artists. Criminals are interested in gaining “confidence” of a
    person so that he/she might share confidential information of a business for
    further exploitation or hacking activities in the future.</p>
    
    <p><strong><span>Types of Social engineering.</span></strong></p>
    
    <p>There are several types of social engineering attacks. Such
    as, baiting; phishing; pretexting; quid-pro-quo; spear phishing; and
    tailgating.</p>
    
    <p>In baiting, criminals leave a malware infected device to be
    opened by an innocent person.</p>
    
    <p>In phishing, criminals make fraudulent communication
    (appearing to be legitimate). Victims are tricked to opening an email with an
    appearance of a legitimate sender. Charity to help poor (but has malware).</p>
    
    <p>In pretexting, criminals are scammers interested in victims
    to disclose confidential information.</p>
    
    <p>In quid pro quo, criminals are offering a gift item to
    attract a victim for obtaining personal data.</p>
    
    <p>In spear phishing, criminals are collecting data from social
    network (Facebook) and customizing this data to gain confidence of a victim in
    order to reveal personal information or trade secrets. </p>
    
    <p>In tailgating, criminals actually follow victims to his
    office or home. Example asking a victim to hold a door open while criminal
    installs a bug (secretly) capable of transmitting data about victim’s
    activities.</p>
    
    <p><strong><span>Solution</span></strong></p>
    
    <p>How to avoid social engineering risks. It is best to educate
    people and remind them constantly about dangers. Constant reminder is a must.
    Otherwise, people forget and tend to overlook cyber risks.<span></span></p>
    
    </div>
]]>
</Body>
<Summary> Definition of Social Engineering.    In social engineering, a cybercriminal is basically relying on social activities (and interactions) of human beings to collect information by tricking them....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80102/guest@my.umbc.edu/0683c6ade561e78e5b6c96486b237cb6/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 09:33:18 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="79961" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/79961">
<Title>RISKS OF DIGITAL DEVICES LEFT UNATTENDED.</Title>
<Body>
<![CDATA[
    <div class="html-content">
    
    
    
    
    
    
    
    
    
    <p>The topic is about pros and cons for leaving a digital
    device unattended, such as a cell phone, a laptop or a desktop computer. It
    does not matter whether devices are personally owned or business owned.</p>
    
    <p><br></p>
    
    <p>CONS:</p>
    
    <p><span><span>1.<span>    
    </span></span></span>This situation of leaving a device unattended is
    like leaving a car unlocked. The biggest risk is about the loss of a device
    itself (i.e. stolen). Thieves would be able to sell parts of a device if not an
    entire device. True, stolen devices could be tracked. But, only when a device
    is unassembled. </p>
    
    <p> </p>
    
    <p><span><span>2.<span>    
    </span></span></span>Loss of privacy. Intruders might be able to see
    (and read) confidential matters. Doesn’t matter whether the stored information
    is personal (e.g. family photos) or business (e.g. contracts). Thus, putting a
    business or an employer at a risk when sensitive information is left unguarded.</p>
    
    <p> </p>
    
    <p><span><span>3.<span>    
    </span></span></span>Spies could install malware on an unattended
    device and download stored information remotely at their convenience.
    (Sometime, government spies including manufacturers from China install malware
    devices on laptops sold to a country for monitoring daily activities).<a href="#_ftn1" title="" rel="nofollow external" class="bo"><span><span><span><span>[1]</span></span></span></span></a></p>
    
    <p> </p>
    
    <p><span><span>4.<span>    
    </span></span></span>Waste of electric power or discharging battery
    if left unlocked and running (while a device is also left unattended). If left
    running 24/7 then internal parts of device would wear quickly (because every
    part has a limited life based on number of operating hours).</p>
    
    <p> </p>
    
    <p><span><span>5.<span>    
    </span></span></span>Children may visit unauthorized webpages in case
    a personal laptop or a cell phone is left unattended. Children might be exposed
    to inappropriate materials. Children may be targeted by predators. Children may
    post something on line (and it is difficult to delete almost anything once
    something is posted on line). Children may play for hours and hours and exposed
    to health risk (i.e. weight gain, watching games on a device left unattended).
    Children distracted from studies. </p>
    
    <p> </p>
    
    <p>PROS:</p>
    
    <p> </p>
    
    <p>Almost none. Except, a minor convenience of not turning ON.
    We see that in offices desktops are left running at night. Monitors get burned.
    Parts get worn (limited life). And, security guards are annoyed.</p>
    
    <p> </p>
    
    <div><br>
    
    <hr>
    
    
    
    <div>
    
    <p><a href="#_ftnref1" title="" rel="nofollow external" class="bo"><span><span><span><span>[1]</span></span></span></span></a> <a href="https://www.pcworld.com/article/2453100/malware-hidden-in-chinese-inventory-scanners-targeted-logistics-shipping-firms.html" rel="nofollow external" class="bo">https://www.pcworld.com/article/2453100/malware-hidden-in-chinese-inventory-scanners-targeted-logistics-shipping-firms.html</a></p>
    
    <p> </p>
    
    </div>
    
    </div>
    
    </div>
]]>
</Body>
<Summary>The topic is about pros and cons for leaving a digital device unattended, such as a cell phone, a laptop or a desktop computer. It does not matter whether devices are personally owned or business...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79961/guest@my.umbc.edu/07a6dfce2715b1b756a35225fd13c507/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 31 Oct 2018 13:31:28 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79724" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/79724">
<Title>Camera Breach!</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><strong><span>Introduction
    - pros and cons of security cameras.</span></strong></p>
    
    <p><span>We are living in
    an age of an Internet-Of-Things (IOT). We know that cyber risk exists whenever
    a device is connected to an Internet. And, today countless devices are
    connected via an Internet.<span> 
    </span>Transportation department has installed cameras on highways to monitor
    traffic jam during rush hours and to evaluate driving conditions of roads
    during a bad weather (e.g. an excessive snow accumulation and rain-flood).
    Police department has installed cameras on streets to minimize street crimes.
    Local governments have installed cameras to monitor a car violating an
    authorized speed-limit near a school zone. Corporations have installed security
    cameras to monitor people entering and leaving a building for safety reasons. <a href="#_ftn1" title="" rel="nofollow external" class="bo"><span><span><span><span>[1]</span></span></span></span></a><span>  </span>In short, security cameras are a necessity (and
    not a luxury) because of the safety concerns of citizens.</span></p>
    
    <p><span>However, the
    disadvantage is that security cameras can be breached (i.e. hacked).
    Information could be stolen. Photos of individuals (including celebrity movie
    stars) entering or leaving an area (such as a gym or a restaurant or a shopping
    mall) could be published in a magazine for a profit. Moreover, a breach of a
    security camera system could lead to hacking of other departments, such as:
    finance, payroll or HR. So, it is important to protect security cameras as much
    as we protect traditional IT systems from hackers. </span></p>
    
    <p><span>In Jan 2017,
    President Trump’s oath taking inauguration ceremony, the cameras installed by
    the police department of Washington DC were infected with malware. 70% of all
    cameras in Washington DC were bugged with ransomware.<a href="#_ftn2" title="" rel="nofollow external" class="bo"><span><span><span><span>[2]</span></span></span></span></a> Cyber criminals were
    demanding money. Luckily, police department turned OFF all city street cameras,
    removed all installed software, cleaned all videos and restarted/rebooted the
    entire system.<span>  </span>City police had to pay
    lot of money for repairing infected cameras in Washington DC.</span></p>
    
    <p><strong><span>How to
    know if a security camera is hacked?</span></strong></p>
    
    <p><span>Often it is
    difficult to know that a security camera has been hacked in a timely fashion.
    Months pass by and people don’t know that the security camera system has been
    breached.<span>  </span><a href="#_ftn3" title="" rel="nofollow external" class="bo"><span><span><span><span>[3]</span></span></span></span></a></span></p>
    
    <p><span>If a security
    camera is working slow (than its normal speed) then it implies that something
    is wrong with a camera. Connection will be poor. Signal could be weak. System
    would be frozen (or locked).<a href="#_ftn4" title="" rel="nofollow external" class="bo"><span><span><span><span>[4]</span></span></span></span></a> More investigations would
    show that camera is breached. Infected virus slows camera’s overall
    performance.</span></p>
    
    <p><strong><span>How to
    protect security cameras from hackers</span></strong><span>.<a href="#_ftn5" title="" rel="nofollow external" class="bo"><span><span><span><span>[5]</span></span></span></span></a></span></p>
    
    <p><span><span>1.<span>    
    </span></span></span><span>Often
    cameras come with a password. Users are lazy to change manufacturer’s password.
    Change temporary password issued by camera manufacturers. Reset passwords.</span></p>
    
    <p><span><span>2.<span>    
    </span></span></span><span>Use
    a strong password instead of “name123”.<span> 
    </span>Use a complex hard to guess password. Strong two factor authentication
    is needed (like for other IT systems).</span></p>
    
    <p><span><span>3.<span>    
    </span></span></span><span>Prefer,
    not to put security camera on a main network. But, if you do, then use an
    advanced firewall software to prevent an intruder. </span></p>
    
    <p><span><span>4.<span>    
    </span></span></span><span>Ideally,
    install and place a security camera on a separate network rather than using the
    main network. This is because in case of a breach a hacker cannot penetrate the
    main network.</span></p>
    
    <p><span><span>5.<span>    
    </span></span></span><span><span> </span>Cameras come with an operating system
    software. Such as Linus and Windows. Thus, update or patch operating system
    software regularly.</span></p>
    
    <p><span><span>6.<span>    
    </span></span></span><span>An
    administrator should not share his /her password with staff even in an
    emergency.</span></p>
    
    <p><span><span>7.<span>    
    </span></span></span><span>Use
    encryption techniques to transmit a camera’s (or a video’s) images. </span></p>
    
    <p><span><span>8.<span>    
    </span></span></span><span>Store
    cameras in a safe place because people will steal an entire camera (to sell
    stored data).</span></p>
    
    <p><span> </span></p>
    
    <div><br>
    
    <hr>
    
    
    
    <div>
    
    <p><a href="#_ftnref1" title="" rel="nofollow external" class="bo"><span><span><span><span>[1]</span></span></span></span></a>
    Web cameras installed on a laptop are subject to cyber risks. However, this
    article is limited to security cameras installed for monitoring an area.
    Similarly, cyber risks associated with smartphone cameras are not discussed.</p>
    
    </div>
    
    <div>
    
    <p><a href="#_ftnref2" title="" rel="nofollow external" class="bo"><span><span><span><span>[2]</span></span></span></span></a> <a href="https://www.sdmmag.com/articles/94748-cyber-security-ip-cameras-everyones-concern" rel="nofollow external" class="bo">https://www.sdmmag.com/articles/94748-cyber-security-ip-cameras-everyones-concern</a></p>
    
    </div>
    
    <div>
    
    <p><a href="#_ftnref3" title="" rel="nofollow external" class="bo"><span><span><span><span>[3]</span></span></span></span></a> <a href="https://www.cnet.com/how-to/how-to-prevent-your-security-camera-from-being-hacked" rel="nofollow external" class="bo">https://www.cnet.com/how-to/how-to-prevent-your-security-camera-from-being-hacked</a></p>
    
    </div>
    
    <div>
    
    <p><a href="#_ftnref4" title="" rel="nofollow external" class="bo"><span><span><span><span>[4]</span></span></span></span></a><span>  </span><a href="https://www.washingtonpost.com/local/public-safety/attack-on-dc-police-security-cameras-had-broad-implications/2018/07/24/7ff01d78-8440-11e8-9e80-403a221946a7_story.html?noredirect=on&amp;utm_term=.eebd9685499f" rel="nofollow external" class="bo">https://www.washingtonpost.com/local/public-safety/attack-on-dc-police-security-cameras-had-broad-implications/2018/07/24/7ff01d78-8440-11e8-9e80-403a221946a7_story.html?noredirect=on&amp;utm_term=.eebd9685499f</a></p>
    
    </div>
    
    <div>
    
    <p><a href="#_ftnref5" title="" rel="nofollow external" class="bo"><span><span><span><span>[5]</span></span></span></span></a> <a href="https://www.een.com/security-camera-system-cyber-best-practices" rel="nofollow external" class="bo">https://www.een.com/security-camera-system-cyber-best-practices</a></p>
    
    <p> </p>
    
    </div>
    
    </div>
    
    </div>
]]>
</Body>
<Summary>Introduction - pros and cons of security cameras.    We are living in an age of an Internet-Of-Things (IOT). We know that cyber risk exists whenever a device is connected to an Internet. And,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79724/guest@my.umbc.edu/43c9ee2ebd4f9df071bbdd650aeb41db/api/pixel</TrackingUrl>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/xxlarge.jpg?1540305480</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/xlarge.jpg?1540305480</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/large.jpg?1540305480</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/medium.jpg?1540305480</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/small.jpg?1540305480</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/xsmall.jpg?1540305480</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/724/19b8f8dc7a41891586bcd86ec11b385d/xxsmall.jpg?1540305480</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 23 Oct 2018 10:39:17 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79341" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/79341">
<Title>Hack Yourself!</Title>
<Tagline>Security! What is it needed for?</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><p><span>Today we are relying on our devices more and </span><span>more. Cyber risks </span><span>associated</span><span> with smartphones are increasing day by </span><span>day. </span><span> </span></p></div><div><p><span>Here is the summary of cyber risks related to smartphones: Covering following topics: a) pros and cons of smartphones, b) basic operating system used in smartphones, c) why an Android operating system software is riskier than any other operating system software, and d) how to minimize cyber risks associated with smartphone. </span><span> </span></p></div><div><p><span>Smartphones are now a part of our daily life. On average Americans are spending 5 hours per day on a smartphone. Moreover, very few of us can live without a cell phone because landlines are disappearing fast. Pros and cons associated with the use of a cell phone are listed below</span><span>.</span><span> </span></p><p><span><br></span></p></div><div><p><span>Pros:</span><span> High level of portability, easy access to web, </span><span>savings,</span><span> constant communication between parents and children, tracking location of a family member or a friend in a distress or an emergency, convenience of taking photos including videos and so on.</span><span> </span></p></div><div><p><span>Cons: </span><span>Texting while driving has increased risk of car accidents, a desire to purchase the newest model introduced in market and above all </span><span>loss</span><span> of family time and human interaction (people are constantly playing games on cell phone instead of engaging in meaningful socialization to build lasting friendship). Cell phones (or smart phones) are also subject to cyber risk losing valuable personal and financial data.</span><span> </span></p><p><span><br></span></p></div><div><p><span>Three </span><span>basic operating system platforms used in smartphones.</span><span> </span></p></div><div><p><span>There are several firms manufacturing cell phones. Too many to list. However, one thing that is common in all cell phones is that it is either based on Apple’s Operating system platform, Android’s operating system </span><span>platform,</span><span> Window'</span><span>s</span><span> operating system platform o</span><span>r </span><span>Blackberry’s operating system platform. In short, all cell manufacturers must adhere to any one of four platforms. Of course, each operating system platform installed in a cell phone has its pros and cons. Consumers chose a cell phone based on technical features (i.e. bells and whistles) along with price and customer services.</span><span> </span></p><p><span><br></span></p></div><div><p><span>Main source of smartphone’s cyber risk (i.e. an open source platform).</span><span> </span></p></div><div><p><span>Often, consumers purchase a cell phone without evaluating cyber risks associated with its operating system. Some operating system platforms are easily hacked where as some operating system are not. In general, we would like to install any application written in any language. For example, we would like to install an application software for controlling </span><span>a </span><span>security system of a cell phone using a software sold by any vendor. This is called an open source system. Apple does not offer this flexibility. Apple phones do not have an open source operating platform. </span><span>The p</span><span>ublic must install only Apple’s application software. Apple’s operating system is proprietary, closed-source and more secure. This is good</span><span>, b</span><span>ecause, a closed-source platform has less cyber risk compared to an open-source. Malware can easily penetrate an application’s software written by an outsider (</span><span><span>i</span></span><span>.e. a third-party firm). TIMES report says that in Apple’s smartphone, “Everything is encrypted, and more importantly, the key to that encryption is extraordinarily difficult to extract.”</span><span> </span></p></div><div><p><span>On the other hand, Android’s operating platform system is an open-source platform. Software writers</span><span><span> </span></span><span>are selling phone-applications at a cheaper price compared to applications installed on Apple phones. To summarize, an internet research suggests that Android operating systems are more vulnerable </span><span>to</span><span><span> </span></span><span>cyber</span><span><span> </span></span><span>risks</span><span>. </span><span>And main reason for this cyber risk is an open source operating platform.</span><span> </span></p><p><span><br></span></p></div><div><p><span>How to minimize cyber risks while using a smartphone?</span><span> </span></p></div><div><p><span>No smartphone is completely 100% safe from cyber risks including an Apple phone which has a closed</span><span>-source</span><span> operating system. However, consumers can take a few basic steps to minimize cyber risks. </span><span> </span></p></div><div><p><span>1. Lock your screen (possibly after every 30 seconds when cell phone is left unattended).</span><span> </span></p></div><div><p><span>2. Wipe out all information from cell phone after 10 failed login attempts.</span><span> </span></p></div><div><p><span>3. Don’t use a pin code for locking screen. Instead, use a complex password with alphabets, numbers and symbols.</span><span> </span></p></div><div><p><span>4. Use biometric (i.e. finger print scanner) for waking up a cell phone. Apple is now using face ID for waking up a cell phone. Facial recognition technology is available on iPhone</span><span> X</span><span> </span></p></div><div><p><span>5. Be careful when downloading an application-software on a smartphone. Malware risk is high. Install an application software only from a reputable store instead of clicking an install button.</span><span> </span></p></div><div><p><span>7. Get rid of application-software installed on a smartphone that are unused (and outdated).</span><span> </span></p></div><div><p><span>8. </span><span>Log</span><span> out from all of your accounts.</span><span> </span></p></div><div><p><span>9. Be careful when browsing a web. </span><span>It’s even b</span><span>etter </span><span>to </span><span>install</span><span> an advertisement blocker.</span><span> </span></p></div><div><p><span>10. Be careful about your </span><span>co-workers</span><span> and friends overlooking over your shoulder when logging into a smartphone. Often, onlookers are trying to steal login password.</span><span> </span></p></div><div><p><span>11. Be careful about phishing. Don’t click on every link that you see on a screen.</span><span> </span></p></div><div><p><span>12. Yes, don’t forget to activate your device locator to trace a stolen or a lost phone.</span><span> </span></p></div><div><p><span>13. Use a two-factor authentication for password verification.</span><span> </span></p></div><div><p><span>14. Turn on the antivirus system installed on a smartphone.</span><span> </span></p></div><div><p><span>15. Use a secure wireless network (instead of logging at </span><span>Starbucks</span><span><span> </span></span><span>or McDonald and so on).</span><span> </span></p></div><div><p><span>16. Don’t sell or exchange a smartphone without resetting the entire device to an original factory setting (to be sure that data stored on smartphone are completely wiped out).</span><span> </span></p></div><div><p><span>Conclusion.</span><span> </span></p></div><div><p><span> We can benefit from modern technologies and devices. However, we must learn how to minimize cyber threats by undertaking a few basic precautionary steps because no operating system is 100% safe from cyber criminals regardless of Apple’s system or Android’s system or Window’s system.</span><span> </span></p></div></div>
]]>
</Body>
<Summary>Today we are relying on our devices more and more. Cyber risks associated with smartphones are increasing day by day.      Here is the summary of cyber risks related to smartphones: Covering...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79341/guest@my.umbc.edu/d7b2686579d655a8c6417e6f951a206a/api/pixel</TrackingUrl>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/xxlarge.jpg?1539194469</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/xlarge.jpg?1539194469</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/large.jpg?1539194469</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/medium.jpg?1539194469</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/small.jpg?1539194469</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/xsmall.jpg?1539194469</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/079/341/aa250827c601fab36dd40cd333448881/xxsmall.jpg?1539194469</ThumbnailUrl>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 10 Oct 2018 13:59:37 -0400</PostedAt>
<EditAt>Wed, 10 Oct 2018 14:02:15 -0400</EditAt>
</NewsItem>

</News>
