Enhancing Business Security In Richmond, Virginia: The Crucial Role of Access Control and Video Camera Systems

In the ever-changing landscape of business operations in Richmond, Virginia, security remains a top priority for companies of all sizes. As threats to businesses continue to advance, it becomes imperative to implement enhanced security measures that not only protect assets but also provide a complete surveillance solution. In this article, we are going to look […]

The post Enhancing Business Security In Richmond, Virginia: The Crucial Role of Access Control and Video Camera Systems appeared first on Johns Brothers Security.

January 18, 2024
Read More >>

Communication Protocols: The Backbone of Successful eDiscovery

During recent onboarding with a new large client, I was pleasantly surprised to see a communication protocol on the agenda. In my experience, clear and consistent communication protocols are often neglected in the eDiscovery process, despite their critical importance. Simply having an email distribution list is usually insufficient. Foundational Importance A recent survey of more than […]

The post Communication Protocols: The Backbone of Successful eDiscovery appeared first on TCDI.

January 17, 2024
Read More >>

New Year, New Scams – Health product scam campaigns abusing cheap TLDs

In recent months, we’ve noticed an increased number of high-volume health product campaigns that exploit cheap top-level domains (TLDs), reaching up to 60% of a TLD’s daily domain registrations.

This blog looks at current trends around health product scams and examines some of the TLDs providing domain names for these large campaigns.  

Dragons’ Dens and Shark Tanks

Health product scams frequently take the form of fake news articles, often impersonating specific newspapers and featuring celebrity endorsements from well-known media figures who have supposedly used the products that are targeted. In this sense, they are similar to the cryptocurrency investment scams we’ve blogged about previously.

Recent scams impersonate organizations such as Fox News, the Daily Mail, The Today Show, and the New York Times, with the latest campaign of health product scams centered around products backed by the judges from the popular TV series Shark Tank (in the US) or Dragons’ Den (in the UK).

A screenshot of a website claiming to be supported by Shark Tank

These articles then use affiliate links to direct users to landing pages that sell products, especially weight loss gummies that purport to induce ketosis, but also other products such as skincare creams, erectile dysfunction supplements, and teeth whitening kits.  

The products (and even the landing pages selling them) may be legal. Still, fake news articles that lure victims to these sites frequently misrepresent the product with false claims and often profit from affiliate marketing. In fact, in the US, the Federal Trade Commission released a consumer warning following the Shark Tank campaigns, which leads with the headline ‘Did your favorite Shark Tank celebrity really endorse THAT? Probably not.’

We often see these types of scams advertised on social media platforms such as Facebook, where accounts have been compromised using credentials captured by a phishing website, similar to how LinusTechTips was

January 16, 2024
Read More >>

How to Keep Valuables Safe in a Dorm Room

Keeping your valuables safe is a concern wherever you go, but when you’re sharing a dorm room with someone else, it’s important that extra precautions be taken. Living with someone you don’t know is one thing, but you will both have family and friends coming in and out at various times, which requires safety measures. […]

January 11, 2024
Read More >>

Comparing Technology & Software for Litigation Management

Managing litigation has always been a significant component of corporate legal practice, but its complexity has intensified over the years. In the past, in-house counsel typically relied on a mix of manual processes and rudimentary software solutions to juggle multiple cases. These methods were labor-intensive, prone to human error, and often resulted in the duplication […]

The post Comparing Technology & Software for Litigation Management appeared first on TCDI.

January 10, 2024
Read More >>

Three Top Commercial Security Trends for 2024

As we usher in 2024, the commercial security landscape is shifting, driven by leaps in technology. We anticipate that business will embrace technological advancements that allow them to streamline security management while providing more robust protection for their data, assets, and people. Below we’ll dig into the top trends we expect to see within the […]

January 4, 2024
Read More >>

Essential NYE Safety Tips

New Year’s Eve is a night that many people look forward to. Whether you decide to stay home or go out to enjoy the festivities, you want to stay safe while ringing in the New Year. To avoid having your night interrupted by an unexpected safety concern, take these tips into consideration. Make a Transportation […]

December 28, 2023
Read More >>

“Quishing” you a Happy Holiday Season

QR Code phishing scams — What they are and how to avoid them.

Originally invented to keep track of car parts in the early 90s, QR codes have been around for decades. After gaining broader acceptance during the COVID-19 pandemic, they are now—perhaps inevitably—being exploited by cybercriminals. Quishing, or QR Code phishing, exploits smartphone users scanning the 2D barcode, which leads to a phishing site, malicious link, or another cyber attack.

We’ll look at the threat from QR code-based phishing and consider why cybercriminals are adopting this technique. Additionally, we’ll explore opportunities to detect and disrupt these attacks at scale.

QR codes in phishing emails: what’s the threat?

QR codes work precisely as malicious links; a victim who scans the QR code – typically using their smartphone – will be directed towards a malicious site. From here, the deception can continue as with any other phishing campaign.

By now, many know how to spot suspicious-looking links in phishing emails that mimic official communications from established brands or institutions. The opposite is true with QR codes: there is typically no user-accessible way to check the destination before scanning.

From a cybercriminal’s perspective, there are several reasons to use QR codes for phishing, often dubbed quishing, including:

  1. Hiding URLs from users – QR codes provide criminals with a very effective mechanism for hiding suspicious URLs, making this an ideal way to bypass growing user skepticism concerning clicking questionable and shortened URLs.  
  2. Circumventing corporate controls – If users receive a QR-based phishing email on their work computer, they will likely scan the code using their phone. Cybercriminals know personal devices may have less built-in security than a company computer or phone. It’s a subtle way of encouraging victims to use devices not under corporate control and are, therefore, less likely to

December 19, 2023
Read More >>

Winter Savings: How Smart Home Security Systems Keep You Warm and Your Wallet Full

As the winter chill sets in, homeowners are not only concerned about staying warm but also about the increasing energy bills that come with heating their homes. In the search for comfort and cost-efficiency, smart home security systems emerge as unsung heroes. Beyond their primary role of safeguarding your home, these intelligent systems can contribute […]

The post Winter Savings: How Smart Home Security Systems Keep You Warm and Your Wallet Full appeared first on Johns Brothers Security.

December 18, 2023
Read More >>