❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

MS-DEFCON 2: Sometimes there’s no fix

7 May 2026 at 03:45
ISSUE 23.18.1 β€’ 2026-05-07 By Susan Bradley It’s time to prepare for the May updates, which includes pausing and deferring them. That’s why the MS-DEFCON level is going to 2. There may be some confusion about the recent changes to the level. You’ll recall that I changed the level to 4 on April 28 and […]

MS-DEFCON 3: KB5083769 causes backup issues

29 April 2026 at 03:45
ISSUE 23.17.2 β€’ 2026-04-29 By Susan Bradley This is a trending story. On the same day I sent out an MS-DEFCON Alert recommending installing the April updates, Ira Shapiro alerts us to issues with backup software. I’m not seeing this with all backup software, but some vendors have mentioned the matter in various forums. The […]

MS-DEFCON 4: Is Secure Boot fixed?

28 April 2026 at 03:45
ISSUE 23.17.1 β€’ 2026-04-28 By Susan Bradley The April updates continue to dribble out more fixes for Secure Boot certificates for some systems. But once you receive the April updates, you still may be waiting for the new certs to be installed. That happened to me on some systems. Nonetheless, the patching world is relatively […]

MS-DEFCON 2: Tax season edition

9 April 2026 at 03:45
ISSUE 23.14.1 β€’ 2026-04-09 By Will Fastie Fresno is experiencing a freak taxation event. Reports remain sketchy, but it appears that an unusual event has occurred in the Fresno area. Apparently, a well-known accounting firm is undergoing a targeted forms attack. Its building has been completely covered with paper tax documents, trapping the staff inside […]

MS-DEFCON 4: Outlook leads the pack in patching issues

24 March 2026 at 03:45
ISSUE 23.12.1 β€’ 2026-03-24 By Susan Bradley This month has been relatively quiet for Microsoft Windows updates. Sure, there are the occasional β€œwon’t install the update” situations that are usually fixed with a repair install over the top. I’ve become tired of seeing them. And there were two out-of-band updates for Windows 11 Enterprise 25H2, […]

A little weak on being right

19 March 2026 at 03:45
ISSUE 23.11.1 β€’ 2026-03-19 By Will Fastie Great care must be taken when conversing with AI bots. In what can only be a galactic coincidence, I corresponded with two people this past Monday, both of whom had chatted with bots. One was an 87-year-old Plus member with a long background in technology and the other […]

MS-DEFCON 2: March updates on the horizon

5 March 2026 at 03:45
ISSUE 23.09.1 β€’ 2026-03-05 By Susan Bradley For once, I don’t anticipate any issues with the forthcoming March updates. Nonetheless, I’ve raised the MS-DEFCON level to 2. It’s always wise to pause updates until thorough examinations are made and any bugs have been worked out. A little patience goes a long way. I’m excited by […]

MS-DEFCON 4: Superstition vs. risk

24 February 2026 at 03:45
ISSUE 23.08.1 β€’ 2026-02-24 By Susan Bradley I’m not a superstitious person. But there are times β€” especially around printers, copiers, or other technology devices β€” when I jokingly say, β€œShush, don’t talk about how they are working. It will jinx them.” And there are times I talk about how well the devices are working […]

MS-DEFCON 2: Business as usual

5 February 2026 at 03:45
ISSUE 23.05.1 β€’ 2026-02-05 By Susan Bradley Unless you really want to be an unpaid beta tester for Microsoft, it’s wise to pause, defer, and mainly sit on the sidelines. That’s why I’m raising the MS-DEFCON level to 2. I realize the opportunity to install January patches was brief, but that’s a combination of calendar […]

MS-DEFCON 3: I wish we had a level 2.5

27 January 2026 at 03:45
ISSUE 23.04.1 β€’ 2026-01-27 By Susan Bradley The January updates present no issues for some, but lots of issues for others. I’m always hopeful of giving everyone some time every month to apply updates after we’ve vetted them. This month, I can lower the MS-DEFCON level to only 2.5. Unfortunately, we don’t have that, so […]

MS-DEFCON 2: New year, same routine

8 January 2026 at 03:45
ISSUE 23.01.1 β€’ 2026-01-08 By Susan Bradley The holidays are behind us, so now we can get back to business as usual. You know β€” when to pause updates so we can test and evaluate the January patches. Thus, the MS-DEFCON goes up to level 2. For those of you still running Windows 10, rest […]

MS-DEFCON 3: A bumpy release for some

24 December 2025 at 03:45
ISSUE 22.51.1 β€’ 2025-12-24 By Susan Bradley We’re ending 2025 with a mixed bag of issues. To be on the safe side, I’m lowering the MS-DEFCON level just one notch, to 3. Even though the holiday season offers many users the time to apply updates, this year it’s not quite as quiet. Use caution. For […]

MS-DEFCON 2: The first month of ESU

4 December 2025 at 03:45
ISSUE 22.48.1 β€’ 2025-12-04 By Susan Bradley Here we go again: This month brings the first security patches to be released to Windows 10 during the Extended Security Update program. Because last month, Microsoft released an additional update to all Windows 10 PCs to fix an underlying issue with the ESU deployment. As a result, […]

MS-DEFCON 4: Windows 10 gets its first extended update

26 November 2025 at 03:45
ISSUE 22.47.1 β€’ 2025-11-26 By Susan Bradley It’s a little rocky. For the most part, the November updates have gone well, albeit with a few expected hiccups. That includes the first suite of updates that are included with the Windows 10 ESU enrollment. A lowering of the MS-DEFCON level to 4 is warranted. Spend some […]

Yesterday’s Cloudflare outage

19 November 2025 at 03:45
ISSUE 22.46.1 β€’ 2025-11-19 ON SECURITY By Susan Bradley Cloudflare experienced a significant outage in the early hours of Tuesday, November 18. The outage was not limited to the United States. ZDNET stated that there were more than 330,000 reports from around the world about Cloudflare being down. Unfortunately, AskWoody was offline, too. I guess […]

Windows 10 Extended Security Updates begin

13 November 2025 at 03:45
ISSUE 22.45.1 β€’ 2025-11-13 PATCH WATCH By Susan Bradley This is the first month for updates from the Windows 10 Extended Security Updates (ESU) plan. If you’ve signed up for the ESU, you should start seeing them as you would have seen any updates in the past. But that doesn’t mean you should install them […]

MS-DEFCON 2: The first month of ESU

6 November 2025 at 03:45
ISSUE 22.44.1 β€’ 2025-11-06 By Susan Bradley This month marks the first time that security updates will be released to Windows 10 under Microsoft’s Extended Security Update program. If you’ve enrolled in the ESU plan, you should see them offered in Windows Update. But that does not mean you should install them now. Nothing has […]

The Deception Game: How Cyber Scams Manipulate Trust to Access Sensitive Information

5 September 2024 at 10:05

In recent years, the landscape of cyber scams has evolved, targeting even the tools designed to protect consumers. One such concerning development involves the exploitation of trusted services to mislead and scam users. This article explores a specific case in which scammers may have taken advantage of these services to deceive users into divulging sensitive information, leading to potential financial losses and identity theft.

The Mechanics of the Cyber Scams

At the core of this issue lies a highly sophisticated cyber scam that exploits the trust consumers place in services that were designed to alert users regarding suspicious activities or data breaches. In this case, however, scammers have managed to breach the very systems intended to safeguard user identities. Here’s how the scam operates:

  1. Compromised Alerts: Users receive seemingly legitimate alert emails from a trusted organization, notifying them of potential security issues. These emails include clickable links that direct users to what appear to be secure websites.
  2. Redirects to Malicious Sites: Upon clicking the link, users are redirected to malicious domains designed to look like legitimate websites or are taken directly to scam sites hosted on platforms like Telegram. These sites may request further sensitive information under the guise of security checks or offer downloads that contain malware.
  3. Exploitation of User Trust: The effectiveness of this scam lies in its exploitation of user trust. Since the alerts originate from a trusted source, users are more likely to click on the links without their usual level of scrutiny. This bypasses standard phishing detection mechanisms, which often filter out emails from suspicious or unknown sources.

Indicators of Deceptive Practices

Several red flags were identified during the investigation into these compromised alerts:

  • Clickable Links in Alerts: Unlike more secure practices adopted by other identity protection services, some alerts include clickable links. This practice is risky because it can easily be exploited to redirect users to malicious sites.
  • Use of Scam Domains: The domains used in these alerts were found to be registered for the explicit purpose of hosting scam operations. For example, one domain redirected users to a Telegram channel that further directed them to malicious downloads or additional scams.
  • High Click-Through Rates: Analysis of traffic to these scam domains revealed a substantial number of users clicking through from these alerts. This suggests a significant exploitation of these alerts, driving traffic to malicious sites and potentially resulting in a high number of compromised users.

Potential Implications and Risks of Cyber Scams

The consequences of this scam could be far-reaching:

  • Financial Loss: Users deceived by these scams might inadvertently provide sensitive information such as banking details, leading to financial fraud or unauthorized transactions.
  • Identity Theft: The exposure of personal information can lead to identity theft, where attackers use the information to open new accounts, make purchases, or engage in other forms of fraud.
  • Malware Infections: Users who download files from these scam sites could infect their devices with malware, further compromising their security and potentially leading to data loss or additional breaches.

Conclusion: How Constella Intelligence Leads the Way in Combatting These Threats

AtΒ Constella Intelligence, we’ve recognized the growing sophistication of scams targeting identity protection services and have implemented advanced mechanisms to safeguard our users.

Our systems incorporate a robust verification and curation process, designed to detect and mitigate these types of fraudulent attacks before they reach our customers. In line with the rigorous standards we detail in our blog Verifying the National Public Data Breach, we employ advanced data validation and monitoring techniques to ensure every alert is legitimate and free from manipulation. By continuously monitoring for suspicious patterns and ensuring that all alerts are authentic, we provide the most secure identity protection available on the market. As the leading identity protection provider, we’re committed to staying ahead of emerging threats and maintaining the trust our users place in us to protect their personal information.

Recommendations for Users

To safeguard against potential scams and enhance online security, consider the following steps:

  1. Avoid Clicking on Links in Emails: Even if the email appears to be from a trusted source, manually navigate to the company’s official website instead of clicking on links in the email. This reduces the risk of being redirected to a malicious site.
  2. Use a Password Manager: A password manager can help generate and store complex, unique passwords for each of your accounts, reducing the risk if one service is compromised.
  3. Monitor Your Accounts Regularly: Frequently check your bank statements and credit reports for any unauthorized activity. Early detection of suspicious activity can prevent more significant financial losses.
  4. Enable Multi-Factor Authentication (MFA): Whenever possible, use MFA on your online accounts. This adds an additional layer of security by requiring multiple forms of verification.

By following these recommendations, users can better protect themselves from the increasingly sophisticated tactics employed by scammers to exploit even the most trusted services.

❌
❌