"30% of Identity Fraud is committed by people we know"
Identity Fraud Report: All You Need to Know

Here is the weekly roundup :

Mobile Security – In the Words of Experts
With all the buzz around mobile security lately, we have decided to compile a list of some of the best mobile security quotes from experts on mobile security – shedding light on the topic from a different angle with each one.

Master Key Brings Relief, Reverses TeslaCrypt Ransomware
Are you a victim of the particularly troublesome strain of ransomware called TeslaCrypt? Fret not, the malware authors have turned a leaf and have now offered the decryption key that will enable you to recover all your encrypted files. The decryption key is free.

Anonymous Brings Down Multiple North Carolina Govt. Websites
An Anonymous-affiliated hacker has targeted a number of government websites in North Carolina as a way to protest against the law dubbed the ‘bathroom bill’. The bill is criticized by many for being anti-LGBT.

117 Million LinkedIn User Credentials up for Sale
A hacker who goes by the moniker “Peace” is trying to sell LinkedIn account information of some 117 million users, including emails and passwords, on an illegal dark web marketplace.

Romanian Hacker of Clinton Emails Pleads Guilty
Marcel Lazar, a Romanian hacker who used the hacker alias “Guccifer”, has pleaded guilty to two separate hacking charges, prosecutors have announced.

Interesting Reading From Around the Web

How Cybercrime Startups Are Adopting Mainstream Tech Business Practices
Cybercrime is one of the most talked-about and least understood topics in the news today. The criminals who run hacking organizations almost never enter the limelight to claim their victories, and you certainly wouldn’t recognize them if you passed them on the street. But the truth is that cybercrime operates much like any legitimate business. There are integrated marketing campaigns, risk and cost analysis, research and development (R&D), even Black Friday deals–all of the things you would normally associate with any company trying to win over customers.

Skimmers Found at Walmart: A Closer Look
Recent local news stories about credit card skimmers found in self-checkout lanes at some Walmart locations reminds of a criminal sales pitch recently seen for overlay skimmers made specifically for the very same card terminals.

Security and Advisory Services Need Improvement: FIS Study
Credit unions deliver quality in-person and digital services but have room for improvement in security, advisory services and member appreciation, according to Jacksonville, Fla.-based fintech firm FIS’ annual study.

Upcomming Events

Net Diligence Cyber Forum
Philadelphia, PA, June 7-8
More information

ICT 2016
Bratislava, SK, June 7-8
More information

Chicago, IL, June 29
More information

LIFARS on SlideShare

Follow LIFARS on SlideShare to Get Notified of New Presentations

Did you know that LIFARS has a SlideShare account?
Head over to our SlideShare profile and follow us to get notified of new uploads.

Our most recent additions include:
Hacking-as-a-Service - Presented by Ondrej Krehel
Dangers of Social Media - Presented by Michal Nemcok

Take Me to SlideShare

Featured Article

Social Engineering Attacks: Common Techniques & How to Prevent an Attack

Cybersecurity experts including Kevin Mitnick, Paul Kubler, and others share their insights and advice about social engineering - including common (and not so common) attacks, new trends, red flags to look out for, and more.

Read Article

Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.