<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.zwirentitle.com/blogs/tag/cybersecurity/feed" rel="self" type="application/rss+xml"/><title>Zwiren Title Agency, Inc - ZTA Blog #Cybersecurity</title><description>Zwiren Title Agency, Inc - ZTA Blog #Cybersecurity</description><link>https://www.zwirentitle.com/blogs/tag/cybersecurity</link><lastBuildDate>Fri, 03 Apr 2026 04:39:02 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Even with MFA Enabled, Password Security Still Matters! ]]></title><link>https://www.zwirentitle.com/blogs/post/how-hackers-are-bypassing-mfa</link><description><![CDATA[Multifactor authentication is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. Learn how you can stay secure.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cJ2NvhlxSHqL1LHPmu0QDQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MwbBNeyyRBervbVCbXUS0w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VcVyPe1HToqPSxOixZmoUA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_dCaV2OweR5uf1xkozqIvTA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="font-size:26px;">Even with Multifactor Authentication (MFA) Enabled, Password Security Still Matters</span><br/><span style="font-size:18px;">​How Hackers are Bypassing MFA</span></h2></div>
<div data-element-id="elm_9YA4UcMVSEKQCahryV1toQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p></p></div>
<p></p><span style="text-align:left;"><div style="text-align:justify;"> Setting up security measures does not mean you’re off the hook for being vigilant. It seems that every time a new security measure is introduced, it isn’t long before hackers find a way to circumvent those measures. Multifactor authentication (MFA) is an incredibly effective security measure to add to accounts. However, we are now learning of hackers being able to bypass multifactor authentication using social engineering methods, such as fake websites. </div></span><blockquote style="margin-left:40px;border:none;"><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;">&nbsp;</p></div>
</blockquote><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">1.&nbsp;Adversary in the middle (AITM) Attack</span></b></p></div>
</blockquote><div><p style="text-align:left;">AiTM attacks are similar to what we’ve seen from hackers in the past, with a unique new spin. Hackers are creating fake websites that look almost identical to legitimate websites. These fake websites are used to deceive users into believing they are logging into a real account. Users will enter in their login credentials into the hacker’s fake website, and as soon as hackers see the credentials are entered, they use those credentials to log in to the actual website, which will trigger the multifactor authentication email or text message or phone alert to get sent to the user. The user then enters in the code on the fake website, which the hackers then use as the code to log in to the actual website</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: These fake websites are typically sent out via phishing emails, or spear phishing emails. Spear phishing is a form of phishing that targets specific individuals or organizations. The most basic solution for preventing yourself from falling victim to this form of an AiTM attack is not clicking the link in the email. When users receive emails with a link to view or sign into an account, don’t use the link in the email to get to the log in page. Open up a new tab or window in the browser and type in the URL, or Google search the company to find the login page, or even open up the mobile application to sign in.&nbsp;</p><p style="text-align:left;">Just DON’T CLICK THE LINK!</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">2.&nbsp;MFA Prompt Bombing / MFA Fatigue Attack</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Some mobile applications offer multifactor authentication in the form of a notification being sent to a smartphone, which opens the mobile application and gives the user the option to approve or deny the login attempt. MFA Prompt Bombing is a tactic hackers have started using after compromising a password (through the usual methods of phishing emails, etc). The hacker will attempt to log in to a user’s account, which sends the user’s phone the notification for approval. The user may find it rather unexpected, so they deny the notification. The hacker will then attempt to log in again, sending a second notification to the user’s phone. The user denies it again.&nbsp; The hacker will continually attempt to log in, spamming the user with MFA notifications, hoping that eventually, the user will either click approve by accident or get so fed up with the notifications, that they click approve to make it stop.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Example:</b>&nbsp;In one instance, when Uber was hacked in 2022, an external contractor was on the receiving end of the MFA Prompt Bombing received a message on WhatsApp from the attacker, pretending to be Tech Support. The message advised the user to accept the MFA prompt. This message is what caused the attack to be successful.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><p style="text-align:left;"><b>Prevention</b>: If a user finds themselves in the middle of an MFA Prompt Bombing attack, it is likely that the hacker already knows the user’s password – if they didn’t have the correct password, they wouldn’t progress to the MFA screen. Rather than just denying the login attempt over and over again, hoping it will stop, try logging into that account and changing the password. Ideally, that would stop the prompt bombing because the hacker would no longer have the correct password.</p></div>
<div><p style="text-align:left;">&nbsp;</p></div><div><blockquote style="margin-left:40px;border:none;"><div><p style="text-align:left;"><b><span style="font-size:18px;">3.&nbsp;Service Desk Attacks</span></b></p></div>
</blockquote></div><div><p style="text-align:left;">Hackers have learned they can bypass MFA by making phone calls to a help desk phone number, pretending to be a user who has forgotten their password. If the service representative on the phone does not enforce the proper verification procedures, they may grant access to hackers.</p></div>
</blockquote><div><div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
</div><div><blockquote style="margin-left:40px;border:none;"><span style="font-size:18px;"><p></p></span></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p></div>
<div><p></p><blockquote style="margin-left:40px;border:none;"><p></p></blockquote></div>
<div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><p></p><p style="text-align:left;"></p><p></p><p></p></div>
<div><p style="text-align:left;">&nbsp;</p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><p style="text-align:left;"><b>Example:</b>&nbsp;The hackers behind the recent MGM Resorts attack used this method, calling to reset a password. The representative unknowingly gave the hackers access to their network, where they were able to upload malware to launch a ransomware attack.</p></div>
</blockquote><div><p style="text-align:left;">&nbsp;</p><p style="text-align:justify;">It is abundantly clear that users MUST continue to pay attention to their security, even with all of their security measures in place. There are several ways for hackers to bypass security measures, so staying vigilant is key (and doesn’t take too much effort). Avoid clicking the links in emails, especially links to login accounts. If for some reason you do click the link in the email, pay attention to the URL – is it the real website? Additionally, password security is still important, even will all the additional security procedures in place. Make the effort to regularly change your passwords and when you do change them, make them unique for each account, with a mix of upper- and lower-case letters, numbers, and special characters. Implementing a strong, unique password for each account makes guessing passwords more difficult for hackers and spammers.</p><p style="text-align:right;"><span style="font-size:8px;">-Emily Comora</span></p></div>
<p></p></div></div><div data-element-id="elm_QiREneI2LnR4QZQyXE75WA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-size:10px;">The Hacker News (2024, Feb 24) 4 Ways Hackers use Social Engineering to Bypass MFA.&nbsp;<i>The Hacker News.&nbsp;</i>Retrieved from&nbsp;</span><span style="font-size:10px;">https: //thehackernews</span><span style="font-size:10px;">. com/ 2024/ 02/4-ways-hackers-use -social-engineering.html</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Apr 2025 14:28:00 -0400</pubDate></item><item><title><![CDATA[Unlocking the Power of QR Codes]]></title><link>https://www.zwirentitle.com/blogs/post/Unlocking-the-Power-of-QR-Codes</link><description><![CDATA[QR Codes, short for "Quick Response code", have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format...]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SdX__yuSTUyJWTwNXBxbXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WcqX3vwvR4iEwR6LvEpH-A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_D30ewmUqQ_6_x3121CL9UA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_D30ewmUqQ_6_x3121CL9UA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mhCFyBHvScammPdVK7hvfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mhCFyBHvScammPdVK7hvfw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">Unlocking the Power of QR Codes:</span></b></span><br><span style="font-size:30pt;color:inherit;">​</span><b><span style="font-size:20pt;">A Comprehensive Guide</span></b><br></h2></div>
<div data-element-id="elm_7ybm0empQvaij_ublEU-gQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7ybm0empQvaij_ublEU-gQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">QR Codes, short for &quot;Quick Response code&quot;, have become ubiquitous in our digital age, facilitating a wide range of applications from marketing to contactless payments. A QR code is a two-dimensional matrix barcode in a visually scannable format. Standard barcodes can only be read in one direction (top to bottom) which means they can only store a small amount of information. Alternatively, QR Codes are read in two directions, top to bottom and left to right, and can be scanned in any direction. This makes them to be easier to capture and allows these codes to store significantly more data than a standard barcode. Additionally, QR codes have an error correction function that makes the code readable even if parts of the code are stained or damaged. QR codes can store a website URL, phone number, digital business card, shipping label, or up to 4,000 characters of text.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">History of QR Codes</span><br></p><p style="text-align:justify;">QR codes were first developed in Japan in 1994 by a company called Denso Wave, a subsidiary of the Toyota Group, as a means of tracking vehicle parts during the manufacturing process. The company declared they would not exercise patent rights, making their QR code technology available to the public. While they were slow to gain popularity, the first mobile devices with QR code readers were created in 2002.As smartphones gained popularity, QR codes became more common. In 2020, Denso Wave continued to improve their original design, adding traceability, brand protection and anti-forgery technology into QR codes.</p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Today, their use has expanded far beyond automotive manufacturing, with applications across various industries. Marketers started using QR codes in ad campaigns to direct consumers to product information or special offers by putting the codes on posters inside or outside of stores, billboards, and even in commercials. During the COVID-19 pandemic, many restaurants replaced hard copies of printed menus with QR codes to comply with CDC guidance and create a “touchless” environment. Interestingly, there is even a company based in the UK, called QR Memories, that creates QR codes for use on gravestones, allowing people to scan the code to read more about that deceased person’s life (typically linking to an obituary or news story relating to them online).</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">How QR Codes Work</span></p><p style="text-align:justify;">QR codes function as a bridge between the physical and digital worlds. They can store a variety of data, such as text, URLs, contact information, or even Wi-Fi network credentials. The patterns within QR codes represent binary codes that can be interpreted to reveal the codes data. A QR code reader can identify a standard QR code based on the three large squares within the code. Once it has identified these shapes, it knows that everything contained inside the square is a QR code. To analyze the code, the scanner breaks the code down into a grid looking at the individual grid squares. Each square in the grid is assigned one a value based on whether it is black or white. It then groups the grid squares to create larger patterns.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Are QR Codes Safe?</span></p><p style="text-align:justify;">While many people are aware that QR codes can open a website, they can be less aware of the other actions that QR codes are capable of initiating on a user’s device. Aside from opening a website, a QR code can be used to execute code. Therefore, it is possible for spammers to program QR codes with URL's that lead to phishing websites used for obtaining unsuspecting user’s personal information or login credentials. It is also possible for cybercriminals to program a QR code with custom malware which could be used to exfiltrate data from a mobile device when scanned, add contacts to your device or even compose emails. A typical “attack” would involve scammers placing malicious QR codes in public places, or even covering up legitimate QR codes. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">With all the possible malicious uses of QR codes and the fact that users cannot determine what a QR code will do just by looking at it, do the benefits outweigh the risks? As with most technology these days, it seems there is always a risk. If you know for sure that a QR code is from a trusted source, then it is probably safe to scan. However, if you are out in public and see a random QR code stuck to a pole on the side of the road, with no context, scanning that code may not be the best idea. Alternatively, there are secure QR code scanners that you can download to your smartphone. For example, Kaspersky QR Scanner instantly checks that a scanned link is safe before providing any information to the user and will alert the user of phishing scams and dangerous links. It also creates a log of past scans so, if necessary, users can look back to see where and when they were compromised. </p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;">Additionally, users may be concerned about QR Codes collecting personal data however, the only data that QR codes do collect (which is only available to the QR code’s creator) includes location, number of times the code has been scanned, the time of day the code was scanned and the operating system of the device that scanned the code.</p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;font-weight:bold;color:rgb(34, 67, 86);">Conclusion</span></p><p style="text-align:justify;">QR codes have evolved from their origin in the automotive industry to become versatile tools used in marketing, retail, healthcare, and more. Understanding how QR codes work and implementing best practices in their use can enhance customer engagement and convenience. As technology continues to advance, QR codes are likely to remain a valuable asset in bridging the physical and digital realms.</p></div>
</div></div><div data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mzh-oRdEaTyo8Z0pUbSxrg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:8pt;">Kaspersky (n.d.) <i>QR Code Security: What are QR Codes and are they safe to use</i>. Kaspersky. Retrieved from&nbsp;https://usa.kaspersky.com/resource-</span><span style="font-size:8pt;color:inherit;">center/definitions/what-is-a-qr-code-how-to-scan. Accessed 2023.</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Nov 2023 11:26:00 -0400</pubDate></item><item><title><![CDATA[The Dark Side of Generative A.I.]]></title><link>https://www.zwirentitle.com/blogs/post/The-Dark-Side-of-Generative-A.I.</link><description><![CDATA[Generative AI is a powerful tool capable of creating remarkably authentic text, images and even videos. While this technology holds immense potential for positive applications, if used by malicious actors, can pose an additional threat to both businesses and individuals.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_GJ2cfrOkROeDLCplJriqLA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xROVL2RKTzmtbT5dnFF8RA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HQu99iiyRaWouYJODTZ5JA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_M6jAgbUoTnK-fBE4qLzpRA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M6jAgbUoTnK-fBE4qLzpRA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:30pt;">The Dark Side of Generative A.I.</span></b></span></h2></div>
<div data-element-id="elm__JnP6zgjRLWE3Ews1O8dvw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__JnP6zgjRLWE3Ews1O8dvw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Generative AI, also known as generative adversarial networks (GANs), is a powerful tool that uses artificial intelligence technology and machine learning to create text, images and even videos that appear remarkably authentic. For example, the platform ChatGPT is an AI powered Chatbot that responds to text input and generates responses accordingly. The platform Dall-E is a platform that generates images in multiple styles based on a text description.&nbsp;While this technology holds immense potential for positive applications, there is a growing concern about its potential misuse in the wrong hands. When it comes to cybersecurity for businesses and individuals alike, it is important to be aware of the potential threats. Generative AI, if used by malicious actors, can pose an additional threat to both businesses and individuals. In this article, we explore the dark side of generative AI and the ways it could potentially be used maliciously.</span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">1. Phishing Attacks: </span></b><span style="font-size:12pt;">Generative AI can be employed to generate highly convincing phishing emails or messages. These messages could mimic the writing style and tone of trusted colleagues, clients, or even executives, making it challenging to detect them as fraudulent. For example, the AI could be used to generate convincing fake emails or websites that appear to be from a legitimate and trusted parties, but are actually designed to spread malware, steal personal information, or steal login credentials.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">2. Deepfake Threat: </span></b><span style="font-size:12pt;">One of the most alarming misuses of generative AI is the creation of deepfake content. Deepfakes are highly realistic manipulated videos or audios that can deceive viewers into believing false information or witnessing events that never occurred. Malicious actors could create deepfake audio clips or videos of politicians, business leaders, public figures, or any random person to damage reputations, spread false narratives, or manipulate public opinion. This poses a significant threat to individuals, organizations, and society at large. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">3. Content Generation and Plagiarism: </span></b><span style="font-size:12pt;">Generative AI models can produce human-like text, making it easier for malicious actors to create large volumes of content quickly. This can lead to an influx of plagiarized articles, blog posts, or social media content, negatively impacting original content creators and diluting the quality of information available online. Business professionals who rely on such content may unknowingly promote stolen intellectual property or expose themselves to legal liabilities.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">4. Fake Reviews and Testimonials: </span></b><span style="font-size:12pt;">Online reviews and testimonials play a crucial role in shaping consumers' perceptions and influencing their purchasing decisions. Generative AI can be used to generate large volumes of fake positive reviews or testimonials, artificially boosting the reputation of a product or service. Those who rely on such reviews may make ill-informed decisions, leading to wasted resources or partnerships with untrustworthy entities.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">5. Social Engineering and Identity Theft: </span></b><span style="font-size:12pt;">Generative AI can assist in creating highly believable fake identities, social media profiles, or online personas. Malicious actors may use these fabricated identities for social engineering attacks, tricking unsuspecting business professionals into sharing sensitive information or granting unauthorized access. Any individual could find it challenging to distinguish between genuine and fake identities, putting their businesses at risk.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Since real estate transactions are a high-value target for scammers, it is crucial to be aware of phishing emails. Many people, when examining an email to determine its legitimacy, look for incorrect grammar or misspelled words; However, if&nbsp; scammers use Generative A.I. to write their phishing emails, it is possible there will be fewer obvious grammatical errors within the emails. While this can make identifying a phishing email more difficult, it is important to remember what to look for to signify a phishing email. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">1.&nbsp;Lack of personalization:</span></b><span style="font-size:12pt;"> While Generative AI can be trained to create personalized content, such as using a recipient’s name or other personal/transaction details, it may not always do so. If an email appears to be a generic message that could have been sent to anyone, it could be a sign that is a phishing email. </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">2. Inconsistent Language or Unusual Sentence Structure</span></b><span style="font-size:12pt;">: Because Generative AI models are trained on large datasets of text, they may generate text that is inconsistent or incoherent. If an email appears to switch between different tones or uses language that is grammatically incorrect, or otherwise inconsistent, it could be a sign that it is a phishing email. Generative AI Models may also produce sentences with unusual structures or patterns that are typically not used in email correspondence. For example, an AI generated phishing email might use overly complex sentence structures or include multiple clauses that are not logically related. Since many scammers don’t have a good grasp on the English language, they may not realize the inconsistencies, complexities or grammatical errors within the text that the AI generated.&nbsp; </span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">3.&nbsp;Suspicious attachments or links:</span></b><span style="font-size:12pt;"> As with regular phishing emails, AI Generated emails may include suspicious links or attachments that can be used to spread malware or steal personal information or login credentials. If an email includes an attachment or link that you were not expecting or seems suspicious, it is important to exercise caution and verify its authenticity before opening or clicking.</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p></div><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">4.&nbsp;Unknown or Unclear Sender</span></b><span style="font-size:12pt;">: As with regular phishing emails, it remains crucial to check who is sending the email. When the sender is unknown, not part of the transaction they are discussing, or if it is unclear who the sender actually is, it is likely that the email is a phishing email. </span></p></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">There is no foolproof way to determine whether an email is legitimate or not; however, being aware of the indicators can help individuals become more vigilant and protect against potential threats. Overall, when evaluating the legitimacy of an email, it is important to exercise critical thinking skills and consider all of the above factors to determine its authenticity. Furthermore, when in doubt of the legitimacy of an email, it never hurts to get the sender on the phone, using a trusted phone number, to confirm whether they sent the email in question. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Generative AI is still in such an early stage of development and there has been rumors of Generative AI companies implementing regulations for their platforms to monitor and prevent malicious use of the AI. While Generative AI presents both an immense potential for positive transformation, it can also be exploited by those with ill intentions. By staying informed, implementing robust security measures, and promoting cyber awareness within your organization, you can mitigate the risks associated with AI generated phishing emails and keep the real estate transactions secure.&nbsp;</span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Jul 2023 16:59:00 -0400</pubDate></item><item><title><![CDATA[Bluetooth Technology]]></title><link>https://www.zwirentitle.com/blogs/post/Bluetooth-Technology</link><description><![CDATA[Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_5hKn-LHFRpe8YsYXToqjNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BN8x8sn1QTm4FeD1kxeYRQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fdF4FV5iQWqAM8NDzxqiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2yKvkLPWTv-7_j9U2IkkXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:30pt;">Bluetooth Technology</span></b></p><div style="font-size:30pt;color:inherit;"><span style="color:inherit;"><b><span style="font-size:16pt;">Is there a Privacy or Security Concern to be aware of?</span></b></span><br></div></div></h2></div>
<div data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s6gUaWmQTqKs1HBvSxZ0TA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Bluetooth technology is an extremely effective tool that allows users to connect wirelessly to other Bluetooth enabled devices. For those who are unaware, Bluetooth is a technology that enables an exchange of data between devices that are located within a short distance (for most devices, the range is about 30 feet when there are no walls or other obstacles present). Devices that contain Bluetooth technology include smart phones, laptops and desktop computers, vehicles, wireless headphones or speakers, smart watches, and even internet connected devices. Therefore, a user can connect their smartphone to their wireless headphones or speakers to play music or connect their phone to their vehicle to talk on the phone “hands free” while driving. Users can even use Bluetooth technology to share images with another Bluetooth-connected device (on Apple devices, this is commonly referred to as “Air Dropping” and on Samsung phones it is called “Quick Share”). While there are many benefits to utilizing Bluetooth technology, there have been a lot of articles noting security and privacy concerns to be aware of when Bluetooth is left on (or enabled) after a user has ended the connection between devices.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUETOOTH HACKING – IS YOUR SOFTWARE UP TO DATE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Security researchers are constantly finding new threats to device security. &nbsp;For example, in 2017 Armis, a security research firm, discovered a Bluetooth vulnerability known as “BlueBorne”. When hackers used the “BlueBorne” to attack a device, they were able to control Bluetooth-enabled devices remotely, which gave them the opportunity to steal data from the device. Additionally, the “BlueBorne” could spread from one phone to another phone, like a virus. This gave hackers the ability to infect more phones without having to physically be within the 30-foot range of each device. &nbsp;Fortunately, the security research firm was able to create a security patch for devices to prevent the “BlueBorne” attack. A security patch is code for the operating system that fills in the vulnerability to prevent hackers from exploiting the vulnerability. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;As cybersecurity firms identify new vulnerabilities in the Bluetooth software, they create new security patches which are rolled out in updates to the software or devices; however, they are only helpful when users update their software. Therefore, updating the software on Bluetooth enabled devices is crucial to eliminate any known vulnerabilities from being exploited and keep your devices secure. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">BLUEJACKING – ARE YOU RECEIVING UNSOLICITED OR PHISHING MESSAGES VIA BLUETOOTH?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;On smart phones and laptops, the Bluetooth setting has the option of being enabled or disabled. When an individual leaves their Bluetooth enabled on their smart phone, they open themselves up to “Bluejacking”. “Bluejacking” is when someone uses a device’s enabled Bluetooth connection to send unsolicited messages. Messages may be a harmless prank from a teenager but could also be a phishing attack. Many people are aware of Phishing emails; however, Phishing messages can be sent via Bluetooth connection. A malicious actor may use “Bluejacking” to send a phishing message to a smart phone or laptop, pretending to be a trusted source, such as a bank, phone company or social media application. The message typically entices the user to click a link that leads either to a website that automatically downloads malware to a device or a fake website designed to look similar to well-known companies and requests the user provide login credentials or other sensitive information. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;To avoid any “Bluejacking” pranks or Phishing messages shared through Bluetooth connection, it is advised that users disable the Bluetooth setting when they have finished using the connection. However, if a user is connecting to Bluetooth devices multiple times per day, it may be tedious to enable and disable the Bluetooth setting before and after using. Alternatively, a user can adjust their device settings to prevent unknown contacts from sharing messages via Bluetooth connection. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">IS YOUR DEVICE PAIRED TO A VEHICLE?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;If you connect your smartphone to a vehicle, your phone’s data may be shared with the car. If it is your personal car, it may not be an issue; however, if you connect to a rental car, you want to be aware of the data your phone is sharing with the rental car. Major car-rental companies have no policies to delete sensitive information collected during the trip after you return the car. Your name and navigation history are considered valuable personal information. Using such data, combined with information publicly available on the internet and social media platforms, a malicious actor could track down an individual. Data that could be collected by a vehicle includes your email address, GPS history, phone book, call log and text messages (if hands-free calling and messaging is used), music streaming login, and more. </span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Interestingly, thus far, data collected on vehicles has been used to fight crime. One man was able to track down teenagers that took his car for a joy ride, using the phone usernames that were stored in the car’s device list. Alternatively, people with malicious intentions can also use data to track people down. To protect yourself, before returning a rented car AND before selling or trading in your personal car, take the time to delete your personal data from the vehicle. This can be done by going into the system settings or Bluetooth settings and deleting your device from the “paired phones” list; or by restoring the vehicle to the factory settings. If you are having difficulty, the car manual can guide users through unpairing a phone and deleting information. </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">SHOULD YOU BE CONCERNED ABOUT BLUETOOTH HACKING?</span></b></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;Generally, most people should not be concerned about Bluetooth hacking. Cybercriminals typically target people with high level security clearance. However, it does not hurt to be extra cautious. IT professionals recommend the following:&nbsp;</span></p><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;">Turn off “discoverable mode”, except when pairing new devices.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">If you’re always using the same peripheral devices, such as Bluetooth headphones, Bluetooth keyboard or mouse, or even Bluetooth connection in the car, “discoverable mode” does not need to be turned on because your device will remember the Bluetooth device’s unique identifier. </span></li></ul></ul><ul><li style="text-align:justify;"><span style="font-size:12pt;">Disable the Bluetooth setting when it is not in use.</span></li><ul><li style="text-align:justify;"><span style="font-size:12pt;">For those who connect to Bluetooth devices multiple times per day, instead of&nbsp; disabling and re-enabling Bluetooth on the device, update the device’s settings to prevent unknown contacts from sharing messages through Bluetooth connection will prevent unsolicited messages or images from being “Air Dropped” or “Quick Shared” to your phone. </span></li><li style="text-align:justify;"><span style="font-size:12pt;">For those who do not want to disable or update their device’s Bluetooth settings, &nbsp;only accept paring and messages requests that are shared via Bluetooth connection from known contacts. </span></li></ul><li style="text-align:justify;"><span style="font-size:12pt;">Deleting personal and device information from rented vehicles that remains saved in the car’s settings after using the Bluetooth connection.&nbsp;&nbsp;</span></li></ul><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:12pt;">Furthermore, as with all technology today, it is recommended that Bluetooth devices are updated regularly. This ensures the devices are running the latest software which includes security patches for newly identified vulnerabilities.</span></p><p style="text-align:right;"><span style="color:inherit;"><span style="font-size:8pt;">-Emily Comora</span></span><span style="font-size:12pt;"><br></span></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 12:18:00 -0400</pubDate></item><item><title><![CDATA[NATIONAL DATA PRIVACY DAY]]></title><link>https://www.zwirentitle.com/blogs/post/NATIONAL-DATA-PRIVACY-DAY</link><description><![CDATA[Data Privacy Day began in the US in 2008, commemorating the signing of Convention 108 - the first legally binding treaty dealing with privacy and data protection. In 2014, the US Congress adopted S. Res. 337, a non-binding resolution designating January 28 National Data Privacy Day.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_JbRCrXDDTciu8tSOFvKSLw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BNPOSeFSQsCe0UnBiI3zcA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FKv76nNwSjGcvtDKuSkMqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZaLAmKlGRxyezcBy1jh-FA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZaLAmKlGRxyezcBy1jh-FA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1>NATIONAL DATA PRIVACY DAY</h1><div style="color:inherit;">January 28, 2023</div></div></h2></div>
<div data-element-id="elm_OClFFzJITVGAfqUIbKGbug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OClFFzJITVGAfqUIbKGbug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Companies collect personal information from users each time they visit a website, set up an online account, or use internet connected devices; however, most people do not know what kind of personal data is collected.&nbsp;According to Pew Research Center, 79% of Americans believe that have no control over what personal data is collected by companies. While it may seem that way, companies are obligated to explain how they collect and use people's data within their Privacy Policy. Additionally, account privacy and security settings often allow users to choose how their data is collected and used.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">For example, when you talk to Amazon's Alexa from your phone, Amazon Echo, or any other smart device, your voice is recorded and saved on Amazon's Cloud until manually deleted and the stored recordings are available for Amazon employees to listen to. Fortunately, Amazon's account privacy settings allow users to delete voice recordings automatically, after a set time period, and prohibit Amazon employees from listening to the saved recordings. All the user has to do is login to their account and change the settings to what they are comfortable with.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Unfortunately, there are online accounts and mobile applications that require certain personal information in order to access their services. For those companies, the personal information collected is of tremendous value; however, it is up to each individual to decide whether the service they are getting in return is worth the data they must hand over, even when the service is free.&nbsp; </span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">DATA PRIVACY DAY</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Data Privacy Day began in the US in 2008, commemorating the signing of Convention 108 - the first legally binding treaty dealing with privacy and data protection. In 2014, the US Congress adopted S. Res. 337, a non-binding resolution expressing support for designating January 28 &quot;National Data Privacy Day.&quot;&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The National Cyber Security Alliance (NCSA) encourages everyone to learn about and understand how to protect their online data. They advise everyone to check the privacy and security settings on every app, account or device and adjust the settings to a level of privacy and security they are comfortable with. It doesn't have to be all at once. They advise starting with the accounts that are used the most frequently, then make a habit of updating one account per week until all of your accounts are updated with the privacy settings of your choice. On the NCSA website there is an in-depth list of common websites and apps with direct links to the account privacy and security settings or to read the company's privacy policy.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The NCSA also recommends reading a company's Privacy Policy before signing up for an account to get a better understanding of what data is collected and what&nbsp; they will do with that data. While many people are worried about their privacy online, few will actually read the privacy policies to learn how companies are using their personal information. A survey performed by Deloitte revealed that 90% of consumers accept legal terms and conditions without reading them. The survey also found that more than 81% of consumers feel they have lost control over the way their personal data are collected and used; however, only 13% of consumers said they never share personal information online. In order for users to understand and control how their data is being collected and used, they must learn what they can do to protect their personal information.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><b><span style="font-size:12pt;">Privacy Awareness for Small Businesses&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">For businesses that collect consumer's data, trust is crucial to the consumer relationship. Consumers trust that the personal information they share is protected. While businesses may never knowingly put their consumer's data at risk, lax security practices can jeopardize a company's sensitive data and expose them to threats. Any company that has a website, communicates electronically via email, or stores customer information in an electronic database has a potential risk of getting hacked if the right precautions are not in place.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Data Privacy Day is an excellent reminder to create, what the NCSA calls a, &quot;Culture of Privacy&quot; at work by teaching all employees what privacy means to your company and the role each person plays in making sure that client and customer's privacy is achieved and maintained.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The NCSA's website provides a list of resources for small businesses, including:&nbsp;</span></p></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">A list of Free Online Security Checkups and Tools that will scan company devices for known malware and identify if any devices are vulnerable to cyber-attacks</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Tips for protecting Consumer Information</span></li><li style="text-align:justify;"><span style="color:inherit;">Informative videos and workshops to advise Small Business Owners how they can implement cybersecurity into their business using the frameworks and standards from the Cybersecurity&nbsp;and Infrastructure Security&nbsp;Agency (CISA), National Institute of Standards and Technology (NIST), Center for Internet Security (CIS), Federal Communications Commission (FCC), Federal Trade Commission (FTC), Payment Card Industry Security Standards Council and more.</span></li></ul></div></blockquote><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Privacy Awareness for Parents:&nbsp;</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">Today, kids are growing up in a world that is completely different from the world their parents grew up in. Not only is it important to teach kids to be safe by looking both ways before crossing the street and not talking to strangers, in today's world kids should also learn online safety and privacy. While there are parental controls that can be implemented on kid's devices and online accounts to protect them online, it is also important for them to learn about data privacy and security and the consequences of not making their personal information private.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">A great way to introduce kids to online safety is by using the &quot;Stop. Think. Connect.&quot; awareness campaign. Stop. Think. Connect. is an online initiative led by the NCSA that encourages all internet users to be more vigilant about practicing safe online habits. Stop. Think. Connect. is also the rule that can be taught to kids to ensure their using the internet safely and securely.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;color:inherit;"><br></span></p></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><div style="color:inherit;"><ul><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Stop, before accessing the internet, and make sure safety and security measures are in place</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Think about the potential consequences of your online actions; and</span></li><li style="text-align:justify;"><span style="font-size:12pt;color:inherit;">Connect to the internet knowing you are protecting yourself and personal data.</span></li></ul></div></div></blockquote><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Additional lessons for kids in security and privacy include the importance of protecting personal information, checking privacy settings on all online accounts, learning to identify safe and trusted websites or mobile applications, and understanding that what happens on social media can stay online forever.&nbsp;</span></p></div><p style="text-align:justify;"><span style="font-size:12pt;"><br></span></p><div style="color:inherit;"><p style="text-align:justify;"><b><span style="font-size:12pt;">Stop. Think. Connect.</span></b></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">The Stop. Think. Connect. website is a great source that provides tips and advice for protecting personal information, accessing secure websites, maintaining device&nbsp;security and more. There are also resources available which are great references when having a &quot;tech talk&quot; with kids and teenagers. Resources are even available for adults regarding cybercrimes, cyber safety, digital decluttering, event specific privacy tips (such as when planning a wedding, vacation, or when holiday shopping), and more.</span></p><p style="text-align:justify;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">While Data Privacy Day may only come once a year, the ultimate goal is to spread awareness so everyone can live a privacy-aware lifestyle. Feel free to contact us and let us know how you are taking control of your online privacy at home and creating a Privacy-Aware environment in the workplace.&nbsp;</span></p></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 27 Jan 2023 12:08:00 -0500</pubDate></item><item><title><![CDATA[Identifying Spoofed Emails]]></title><link>https://www.zwirentitle.com/blogs/post/Identifying-Spoofed-Emails</link><description><![CDATA[Spoofed emails are more challenging to spot because the messages look like they are actually coming from a known, trusted party. In real estate transactions, scammers will use transaction specific information gained from studying prior emails, to craft spoofed emails that are difficult to identify.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_88vI7Q0TTXymJKkjxnWHhA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZoI-ty0pRVqQkeKfEIxP-Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_G-aqIdYlROGPKRGKc6JFMQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_MN2-Ln6tSXqrB80UO18wfA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MN2-Ln6tSXqrB80UO18wfA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span style="font-size:24pt;">Identifying Spoofed Emails</span></b></span></h2></div>
<div data-element-id="elm_mqdsA5IxThKNyex2fDw89g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mqdsA5IxThKNyex2fDw89g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">A fraudster's income is largely based on defrauding innocent individuals, so like most other careers, the more proficient they become at their &quot;job&quot;, the more they earn. Real estate transactions are a huge target because it means a bigger pay day. This is simply a reminder that they are working relentlessly to defraud individuals because their livelihood relies on it.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Individuals can pay for and implement many forms of cybersecurity defenses such as security software and email spam filters; however, phishing and spoofed emails often get past the defenses and make it to the Inbox. Therefore, it is each person's job to be alert for suspicious activity to keep from becoming the scammer's next victim.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Spoofed Emails in Real Estate Transactions</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">In real estate transactions, scammers use phishing emails to compromise an email account of someone involved in a deal to gain access to that person's emails. Once they have access, they can read all of the emails related to&nbsp;the transaction and learn specific details that only those included in the emails would know (i.e. loan amount, closing date, funds needed to close, other parties involved in the transaction, etc.). Next, they will try to impersonate someone in the email thread by creating a similar email address or by forging the &quot;email from&quot; address. This is a process known as spoofing. Spoofed emails are emails from scammers that&nbsp;are made to appear like they are coming from a real person.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Spoofed emails are more challenging to spot because the messages look like they are actually coming from a known, trusted party. In real estate transactions, scammers will use transaction specific information gained from studying prior emails, to craft spoofed emails that are difficult to identify. When scammers choose who, within the transaction, they want to impersonate, they will study the prior emails written by that person and note any key words and phrases often used. Then, when crafting a spoofed email, they use those same key words and phrases, along with transaction specific details and will even copy that person's email signature to make it seem more legitimate.&nbsp;The scammer's ultimate goal, when sending spoofed emails, is to send fake wire instructions so funds are sent to their account, instead of the account of whomever is handling the settlement.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When reading about real estate wire fraud victims, many of them have said they had sent a few emails, back and forth with the scammer spoofing emails before receiving fake wire instructions, and they had no idea they were not communicating with the actual person. This is a clear indication that scammers are skilled at spoofing emails and impersonating people. Hence, learning to identify spoofed emails is critical for preventing wire fraud.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">The following are some examples of how you can identify a spoofed email.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">1. Look at the sender's actual email address.</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When sending their spoofed emails, scammers often create an email address that is similar to the person they are trying to impersonate&nbsp;by changing a few characters, or using a different domain extensions (such as “.net” or “.org” instead of “.com”)&nbsp;to trick users into thinking the email has&nbsp;come from a friend, colleague, vendor, client or other known party . They may even create a new email account&nbsp;at a public domain (i.e. Gmail, AOL, etc.) by copying the person's full email address (domain and extension included) to make it appear legitimate. The unsuspecting&nbsp;user won't see any spelling errors in the email address and may overlook the domain.&nbsp;Additionally, scammers often&nbsp;add a Display Name to their email which distracts the user from their spoofed email address.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">For example, in the below image, labeled Image #1, the display name says the email is coming from John Smith and it is addressed to you and your co-worker. Not very suspicious at first glance; however, if you look at the sender's actual email address (within the angle brackets) the spelling of &quot;John&quot; and &quot;Smith&quot; are not correct. The &quot;N&quot; in John was replaced with an &quot;M&quot; and the &quot;M&quot; in Smith was replaced with an &quot;N&quot;. Plus, in this example, the full email address, domain and extension were used to create a new Gmail account. At first glance, an unsuspecting user sees this email and doesn't think twice because it looks like John Smith's actual email address.&nbsp;</span></div></span></div>
</div></div><div data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width: 647px !important ; height: 145px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width:647px ; height:145px ; } } @media (max-width: 767px) { [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"] .zpimage-container figure img { width:647px ; height:145px ; } } [data-element-id="elm_ETQ1lJseIddTlOo0WSMTvg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-SendersAddress.png" width="647" height="145" loading="lazy" size="original" alt="Image #1" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #1: Check the sender's actual email address</span></figcaption></figure></div>
</div><div data-element-id="elm_SDtBzeWijuEmhh3nx1F0Fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SDtBzeWijuEmhh3nx1F0Fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Therefore, if you receive an email from someone you know, but the content of the email seems suspicious, out of character, or request’s sensitive information, double check the sender’s email address to ensure it is spelled correctly and has the correct domain and domain extension.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">2. Check where the email response will go.</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Some scammers will send spoofed emails that appear to come from the actual email address of whomever they are impersonating. Since the email looks like it came from a legitimate source, checking the sender's email address is not an effective method of identifying a spoofed email.&nbsp;Scammers who spoof emails like this can easily trick users into reading their emails;&nbsp;however, since their goal is to correspond with the user, the scammer needs to receive the user's email reply.&nbsp;They accomplish this by manipulating the email's &quot;Reply-to&quot; settings, which are email settings that allow the sender to program where a reply email is sent. The scammer will program the email so the reply is sent to themselves and not sent to email address of the person they have spoofed.</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">For example, in the below email header (Image #2), the email address is correct, leading the user to believe the email is legitimate.&nbsp; Upon clicking &quot;Reply&quot;, the response message automatically populates an email address into the &quot;To&quot; field, based on sender's &quot;Reply-To&quot; settings.&nbsp;In Image #3 below, the email address that populated in the &quot;To&quot; field is clearly not the same email address that sent the initial email (from image #2).&nbsp;</span></div></span></div>
</div></div></div><div data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width: 621px !important ; height: 141px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width:621px ; height:141px ; } } @media (max-width: 767px) { [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"] .zpimage-container figure img { width:621px ; height:141px ; } } [data-element-id="elm_g33fqWKYtzcnXwnj8Wfeww"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-SendersAddress-Correct.png" width="621" height="141" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #2: Sender's email address is correct, so check the Reply-To email address</span></figcaption></figure></div>
</div><div data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width: 623px !important ; height: 163px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width:623px ; height:163px ; } } @media (max-width: 767px) { [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"] .zpimage-container figure img { width:623px ; height:163px ; } } [data-element-id="elm_eMs5PNNxP_qATHy5wfOyGg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-ReplyAddress.png" width="623" height="163" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #3: Reply-To email address doesn't match the sender's address</span></figcaption></figure></div>
</div><div data-element-id="elm_oeM7keib4_BZ3PQxUOOjpQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oeM7keib4_BZ3PQxUOOjpQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">When an email from someone you know seems out of character or requests sensitive information that is unnecessary for the sender to have, you may have a suspicion that something isn't right, so you check the sender's email address, to make sure it is correct.&nbsp;When the email address is spelled correctly and the domain extension is also correct, check who the Reply Email will be sent to by simply clicking the &quot;Reply&quot; button. Also, if you have any questions as to the validity of the email it may be a good idea to forward the email to the actual person's known trusted email address instead of replying to the suspicious email.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">3. Look at the phone number in the email signature</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">In real estate transactions, parties are typically advised to call and confirm wire instructions before sending wires. Therefore, when scammers send fake wire instructions, they will copy and paste the email signature of the individual they are impersonating; however, they often&nbsp;replace the phone number in the email signature with their own phone number. This ensures the party who received fake wire instructions will call the scammer to confirm the fake wire instructions. When the scammer confirms the fake wire instructions are correct, the unsuspecting user ends up sending their funds to the scammer's account and by the time anyone realizes, the funds are no longer traceable.&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><span style="font-size:12pt;"><span style="color:rgb(34, 67, 86);"></span><div style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Image #4 below, shows John Smith's actual email signature and the scammer's spoofed email signature. At first glance, they look identical, and any unsuspecting reader could be fooled; however, when you look at the phone number in the scammer's spoofed email signature, it is not the same as John's actual phone number. Not only is it different, but it also has an area code for a different state.&nbsp;</span></div></span></div>
</div></div></div></div><div data-element-id="elm_ALNfMeyCAof62FioNE9Auw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width: 636px !important ; height: 192px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width:636px ; height:192px ; } } @media (max-width: 767px) { [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"] .zpimage-container figure img { width:636px ; height:192px ; } } [data-element-id="elm_ALNfMeyCAof62FioNE9Auw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Phishing-Email%20Signature.png" width="636" height="192" loading="lazy" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-left"><span class="zpimage-caption-content">Image #4: John Smith’s email signature vs. the Scammer’s email signature in Spoofed Email</span></figcaption></figure></div>
</div><div data-element-id="elm__u4Jc-1gRMPWL3exZQTyaQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__u4Jc-1gRMPWL3exZQTyaQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><div><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Checking the area code can be a helpful indicator of whether the email is spoofed. If you know a company is based out of New Jersey, but the phone number area code is from South Carolina, a warning&nbsp;signal should go off in your head. However, even if the area code was from the same state as the company and the email seems suspicious, you could compare the phone number to another email from that person, but the easiest solution is find a company's phone number online, either on Google (or any other trusted search browser) or by visiting the company website. Especially when it comes to confirming wire instructions, it is recommended that the phone number is either confirmed prior to receiving the wire instructions via email or from a known trusted source (like the company's website).&nbsp;</span></p><p style="text-align:left;"><span style="font-size:9pt;color:rgb(34, 67, 86);">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;color:rgb(34, 67, 86);">Always to be On-The-Lookout for Spoofed Emails</span></b></p><p style="text-align:left;"><span style="font-size:12pt;color:rgb(34, 67, 86);">Remember to keep these tips in mind when reading emails. Scammers are always looking for ways to infiltrate real estate transactions and exploit individuals for their own personal gain That is why it is important to always remain vigilant when receiving emails, whether it is from an unknown sender, an organization you are familiar with, or even someone you know.</span></p></div>
</div></div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 19 Dec 2022 15:55:01 -0500</pubDate></item><item><title><![CDATA[Cybersecurity Awareness Month]]></title><link>https://www.zwirentitle.com/blogs/post/Cybersecurity-Awareness-Month</link><description><![CDATA[In 2004, the US Government declared October as Cybersecurity Awareness Month to help individuals protect themselves online as threats to technology and confidential data became more common.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_YjnmQHcCREGWsnoo0pB7zQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_vw6hXEaHQGCFTpKOQ_HgPA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MU515GIuTyu9KBqNDkTxqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_MU515GIuTyu9KBqNDkTxqQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6wxmrKr2SVSLYhZSKL-A4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6wxmrKr2SVSLYhZSKL-A4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p align="center"><b><span style="font-size:24pt;">Cybersecurity Awareness Month</span></b></p><div style="font-size:24pt;color:inherit;">​<b style="color:inherit;font-size:30px;"><span style="font-size:18pt;">2022 Theme: &quot;See Yourself in Cyber&quot;</span></b></div></div></h2></div>
<div data-element-id="elm_JDapgLQ1Tzy3F4z5yKQPBw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JDapgLQ1Tzy3F4z5yKQPBw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;">In 2004, the US Government declared October as Cybersecurity Awareness Month to help individuals protect themselves online as threats to technology and confidential data became more common. A national campaign is lead by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA). This year’s theme is “See Yourself in Cyber”, focusing on each individual’s part in maintaining data security. For individuals and families, this means taking action to maintain basic cyber hygiene such as updating software on devices, utilizing strong unique passwords for each account, and enabling multifactor authentication on every account that offers it and remembering to “think before you click” on links received via email. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">As a personal note, I agree that maintaining basic cyber hygiene is crucial to keeping devices secure; however, I also believe it is important to understand why each of these tasks is effective. Understanding why, means learning about how cybercriminals work to compromise your security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Cybercriminals: Hackers vs. Scammers</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">There are cybercriminals who focus on hacking and cybercriminals who focus on scamming. Both types of cybercriminals typically work 24-7 to accomplish their goals. Hackers are skilled coders who spend their time scanning through device software looking for potential weaknesses that they can exploit. When they find weaknesses in the software, they develop malware or viruses that exploit those weaknesses to gain access to devices. Alternatively, scammers are those who focus on the exploiting the people who use the devices. They develop phishing emails and fake login websites that look almost identical to legitimate websites, to trick people into providing their login credentials. Using those login credentials, they can access those people’s accounts. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Significance of Updating Software</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">When hackers successfully find a way to hack into software and computers, it is typically through a weakness they have find in the software. When the security teams are alerted of the weakness that is being exploited by hackers, they issue a security patch, which patches up the weakness in the software. These security patches are included in software updates that are sent to the devices. Therefore, it is crucial to update your device software to maintain the device security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Many devices offer an “Automatic Software Update” option in the settings. For example, on iPhones, the automatic iOS updates can be turned on in the iPhone Settings. When the setting is enabled, the iPhone will download the iOS update as soon as it is available and send a notification advising that the updates are ready. Then, the installation of the iOS update will occur overnight, but only if the iPhone is charging and connected to Wi-Fi. Enabling the automatic software update option is an efficient way of keeping your devices up to date. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Significance of Strong Passwords</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">Scammers send phishing emails to try and lure people into providing their login credentials; however, they have other methods of gaining access to user accounts as well. Many people use personal information in their passwords, such as birthday, children’s names, pet’s names, and even favorite sports teams. When finds a scammer finds a target with personal information as a password, they could use a basic Google search to find out personal information and guess the person’s password. Therefore, utilizing a strong password is crucial. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">A strong password consists of at least one upper- and lower-case letter, number, and special character, however, a strong password may not be sufficient if the same strong password was used for multiple accounts. If a scammer were to find someone's strong password, the scammer would be able to gain access to each account that utilizes that same password. Thus, a unique password for every account is also essential to maintaining account security. It may be exhausting to have to come up with new, strong passwords for every account, but if you value your account security, it is necessary. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">Multifactor Authentication</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">While strong unique passwords are essential and very helpful in preventing scammers from accessing accounts, multifactor authentication adds a second layer of security. Examples of Multifactor Authentication are biometric scanning (i.e., fingerprint, face scan, eye scan, etc.), would require the scammer to have a copy of your fingerprint. Another multifactor authentication method is entering a code that is provided through another method, such as texted to your phone, sent via email or recited during a phone call, and even sent to a second device or application, etc. These types of multifactor authentication would require the scammer to physically have your cell phone to receive the text message or open the security app or would need access to your email account to obtain the code. Therefore, if for some reason an account password is compromised, the user has the second layer of security protecting their account from the scammer. Not all accounts offer multifactor authentication, but when they do, it is a good idea to enable that extra level of security. </span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><p style="text-align:left;"><b><span style="font-size:12pt;">“Think Before you Click”</span></b></p><p style="text-align:left;"><span style="font-size:12pt;">Many scammers who send phishing emails are skilled at building websites. They are capable of building a fake website that looks almost identical to a real website. Many phishing emails include a link to change your password or update your account settings. When people click the link, they are brought to the scammer’s fake website and prompted to enter their account login credentials. If they proceed by entering their username and password, when the click the “Login” button, they will be given a login error message. However, by clicking the “login” button, they are actually sending the login credentials to the scammer. Additionally, some scammers will buy viruses on the “dark web” and by clicking the link in the email or clicking the “login” button on the fake website, or even downloading a file attached to a scammer’s email, will trigger the virus to download onto your computer</span></p><p style="text-align:left;"><span style="font-size:9pt;">&nbsp;</span></p><span style="font-size:12pt;"><div style="text-align:left;"><span style="font-size:12pt;color:inherit;">There are many things to look for that indicate an email is from a scammer. The most commonly known indicator is grammatical errors and typos, however, as scammers have become more advanced, their emails have fewer grammatical errors so it is important to look for other signs. Many scam emails are a template email, with no personalizing information. Typically, when receiving a legitimate email about your account security, the email will include some type of personalizing information, but most scammers won’t personalize the email template at all. Additionally, Try looking at the sender’s actual email address – a scammer will create a fake email account that may look similar to whoever they are trying to impersonate. For example, a scammer may try to impersonate Amazon.com by sending an email stating your account security has been compromised and then requesting the user to click the link to change their password. They may use an email domain such as @amazon-security.net; however, real Amazon security alerts come from the email domain @amazon.com. Checking the sender's actual email address may be a clear sign of a phishing email. Scammers also like to add a sense of urgency to their emails, to trick people into acting quickly, without thinking. They may say something along the lines of, &quot;If you don't act immediately, your account will be suspended&quot; (or deleted). Don't fall for their tricks! If you feel like you're being pressured to click the link, take a second and remember to look for any indication of a phishing email. If you don't see any, then to be safe, open a new web browser, type in the website URL and login from there (in a legitimate email the links are just a quicker way of getting to that login page).&nbsp;</span></div></span></div><div style="text-align:left;color:inherit;"><span style="font-size:12pt;"><br></span></div><div style="color:inherit;"><div style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;">While security software is available to help prevent scammer’s emails or identify potential malware and block it from downloading on devices, the security systems are only as good as the individuals using them. Therefore, it is crucial for an individual’s data security that they update software whenever it is available, utilize strong unique passwords, implement multifactor authentication whenever possible and remain vigilant when reading their emails by thinking before you click. Feel free to visit the Cybersecurity and Infrastructure Security Agency's Website for more information on how to be secure online.&nbsp;<i>(If I left the link, would you think before clicking it?)</i></span></p></div></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Oct 2022 12:21:00 -0400</pubDate></item><item><title><![CDATA[The Internet of Things - Smart Fitness]]></title><link>https://www.zwirentitle.com/blogs/post/The-Internet-of-Things-Smart-Fitness</link><description><![CDATA[Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_VLRBZOAySSKZTEl93J-_xg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_B2LAAK9wSf276H45FzEvXA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_JWsw3RGZTSKTz8n5HuBawA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YBsn1PsGQmWKjHQJFJOI7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="font-size:11pt;text-align:left;"><span style="font-size:12pt;color:rgb(0, 0, 0);">The Internet of Things (IoT) is a term encompassing everything connected to the internet, but increasingly defines objects that connect. Essentially, an IoT device is any device with an &quot;on/off switch&quot; that connects to the internet, or to another device that uses the internet. Examples include smart phones, smart light bulbs, kitchen appliances, security cameras, wearable devices, industrial manufacturing robots, cars, navigation systems, GPS trackers, and so much more. A February 2020 report found there are 30 billion connected IoT devices on the planet, which is projected to double over the next five years.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Some examples of fitness industry IoT devices include wearable devices, internet-connected cardio machines, and even virtual reality headsets. According to a Statista report, the number of connected wearable devices increased from 326 million in 2016 to 722 million in 2019.&nbsp; The development and mass production of such devices has changed where and how people get exercise with devices that allow people to get a &quot;gym-like&quot; workout from the comfort of their home and innovative methods that make physical activity fun and engaging.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Wearable Devices</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Modern wearable devices were first introduced in 1965, the Manpo-kei pedometer which translates to &quot;10,000 steps meter&quot; along with research that stated 10,000 steps per day along with the proper caloric intake, was the key to maintain a healthy body. In the 1980s, Polar watches introduced the wireless heart rate monitor.&nbsp; Today, wearable devices can track much more than just an individual's step count and heart rate. Some of the more advanced devices are able to detect body temperature, activity level, speed, calories burned, distance traveled, changes in elevation and sleep patterns. Sensors for collecting data have been added to various wearable objects transforming them into a data-tracking device, such as bracelets, rings, anklets, clip-on devices, and sneakers.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Wearable fitness tracking devices typically connect to a smart phone and share the collected data with its mobile application counterpart. Within the mobile application, the user can create an account where their data is stored and they can set personal goals for themselves. Mobile applications can include a journal of daily activity or charts of their collected data over a period of time, allowing users to identify when they are making progress towards their goals.&nbsp;Some wearable device’s mobile application allows users to share their fitness analytics with others, adding a social component that can be used to compete with friends and family. Data collected on wearable devices can also be shared with other applications such as apps that host virtual races or virtual fitness events and challenges.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Smart Cardio Machines</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Cardio machines have progressively advanced into internet-connected machines with touch screens, interactive interfaces, and user accounts. By setting up an account on a smart machine, the user's data is collected by the machine's built in sensors and saved to their account. The user can then login to their account on any other machine, of that brand, and their data is always stored to their account. Some cardio machines with built in screens give the user the choice of viewing a scenic route as they workout, giving them the illusion of running or biking through different parts the world.&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Additionally, many companies have developed subscription based applications that utilize live streaming technology or on-demand streaming, allowing people to participate in a fitness class from the comfort of their home. While a streaming app is not an IoT device, companies have implemented their applications into devices that connect to the internet, including, stationary bikes, treadmills, ellipticals and even rowing machines.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Virtual&nbsp;Reality Workouts</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">With the rise of virtual reality (VR) technology, an individual can engage in physical activity with a VR gaming headset, such as the Sony's PlayStation&nbsp;VR or the Oculus Quest. Utilizing the VR headset and controls held in each hand, a person becomes immersed in a computer-generated world that responds to the movement of sensors located in the headset and hand controllers, allowing them to interact with&nbsp;their virtual&nbsp;environment. Some of the games created for VR technology include dancing, boxing, racquetball, and rock climbing, which require the user to dance or move around as if they were actually in the ring, on the court or scaling the side of a mountain.</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">For the many people who enjoy gaming, the VR headset gets them off of the couch and into a simulated world, where they have to physically move around in order to progress through the game. Many of the games require the player to move laterally, jump or squat to avoid an object that is headed toward them, or swing their arms around, using motions comparable to a tennis swing, to engage with an object or another character in the game. While these types of games may not be considered “fitness” by a regular gym-goer, they certainly increase an individual’s&nbsp; physical activity, especially when the alternative for that individual is sitting on the couch and playing a video game.&nbsp;</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Privacy and Security</span></p><p style="font-size:14pt;text-align:left;"><span style="font-weight:bold;color:rgb(0, 0, 0);"><br></span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT fitness devices have changed the fitness industry, empowering people to track their activity and find alternative ways to get active. However, as with any internet connected device, it is essential to be aware of the IoT device’s security and privacy settings.&nbsp;Wearable fitness tracking devices store basic personal health information.&nbsp;When such information is collected at a doctor’s office or hospital it is protected by the Health Insurance Portability and Accountability Act (HIPAA); however, HIPAA does not extend its protections to health data accumulated by personal fitness tracking devices. While basic health information may not seem like much of a privacy concern, when wearable devices are used for long periods of time, the information collected begins to paint accurate picture of an person’s health, lifestyle, habits, and identity.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Fortunately, companies are building strong security measures into the devices, making the actual device difficult to hack. However, security weaknesses typically occur when user profiles within the device's corresponding mobile applications are not secured with strong unique passwords. Easy-to-guess passwords give hackers the ability to compromise a user's account. Therefore, when creating a password for your health mobile application, it is imperative to make it unique from other account passwords, and utilize a combination of upper and lower case characters, a number, and special character (i.e. !, @, #, &amp;, *, ?, etc.). Additionally, enabling multi-factor authentication, if available, improves account security significantly.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">Privacy is a major concern for a many people. While the IoT devices may be secure, and the user’s password may be strong and unique, to ensure the information stored within the account remains private, it is important to read the company’s privacy policy. While the data accumulated from fitness tracking devices alone pose no great risk to an individual’s privacy, when the data is associated with other information, there are greater privacy implications if the data is misused or shared with third parties.</span></p><p style="font-size:11pt;text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p><p style="font-size:12pt;text-align:left;"><span style="color:rgb(0, 0, 0);">IoT devices in the fitness industry are innovative and offer people new approaches to work out, giving them the freedom to get active outside of a gym. Plus, detailed tracking of various metrics, keep people informed of their progress overtime. The benefits of such devices outweigh the risk of security and privacy, when the user is informed of the privacy policy and settings and&nbsp;actively securing their user accounts.</span></p></div></div>
</div><div data-element-id="elm_ugTYcdCxSb-y7XMPUZCAlw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 19 Jul 2022 16:40:44 -0400</pubDate></item><item><title><![CDATA[Cookies! ]]></title><link>https://www.zwirentitle.com/blogs/post/cookies</link><description><![CDATA[&nbsp; &nbsp; No, not chocolate chip or sugar cookie, we're talking about HTTP cookies. These cookies, otherwise known as web cookies, are little bits ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_93oLo_AYR7GA1VbD_zeYyw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hWhwWIw1RsiOMI3l5DFdzA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_hWhwWIw1RsiOMI3l5DFdzA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dq025p6BRiyaQKwkjYfwnA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_dq025p6BRiyaQKwkjYfwnA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_-Ixz1LfvQeGOfHqUYIcLuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-Ixz1LfvQeGOfHqUYIcLuQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;font-size:20px;">The ones that are good and the ones to avoid.&nbsp;</span><br></h2></div>
<div data-element-id="elm_EvEettRGTwSCqXjgvJXxWw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EvEettRGTwSCqXjgvJXxWw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="font-size:12pt;color:rgb(0, 0, 0);">&nbsp; &nbsp; No, not chocolate chip or sugar cookie, we're talking about HTTP cookies. These cookies, otherwise known as web cookies, are little bits of data that are collected by a website and saved in a tiny file on your computer and on the website’s server.&nbsp;Originally created in 1994 as a solution for making online shopping carts possible, the first application of cookies was on the Netscape website to determine whether a user had previously visited the website. Today, their purpose is to enhance your overall web browsing experience by remembering your recent activity, and tailoring your web experience to you.&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Prior to the media’s exposé on web cookies in 1996, cookies were accepted by default and people had no idea of their existence.&nbsp; Once people became aware, web cookies became a major topic of discussion as a digital villain invading everyone's privacy.&nbsp;While <b>the fear of cookies invading privacy</b>&nbsp;is valid for some in some instances, some cookies actually benefit the user while browsing the internet.&nbsp;Some web cookies contribute to the User Experience (UX) making web browsing as easy as it is today. For example, cookies are the reason e-commerce websites will remember your shopping cart when you return to a site where you never checked out. Additionally, websites can use cookies to cross reference your activity with other users who had similar activity, allowing them to create recommendations such as &quot;Customers Also Viewed&quot; on e-commerce sites, &quot;Suggested Content&quot; on video streaming platforms, or &quot;Related Searches&quot; in search engine sites.&nbsp;</span></p><p><span style="font-size:9pt;color:rgb(0, 0, 0);">&nbsp;&nbsp;</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);">How Cookies Work</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Every time you connect to a website, the site will search their server for any existing cookie data.&nbsp;Your first time visiting a website, since there is no cookie data stored yet, your web browser connects to the website and a small file is created on the website's server to save your activity and preferences.&nbsp; That file is also saved within your web browser on your computer.&nbsp;</span><span style="font-size:12pt;color:rgb(0, 0, 0);">Typically a website creates a unique anonymous identifier to remember you rather than storing personal information on the server;&nbsp;</span><span style="color:rgb(0, 0, 0);font-size:12pt;">however, if you enter in personal information on the website, this information is typically encrypted and stored within the unique cookie id.&nbsp;</span></p><p></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">The next visit, and any future visits to that website, your cookie data will be found in the site's initial search of their server, allowing your preferences, unpaid items in a shopping cart or login information to load automatically. Any new activity or preferences set while visiting the site is then saved to your cookie file for the next time you visit.&nbsp;</span></p></div>
</div></div><div data-element-id="elm_E7uQu8Tpatagwh-zec_V9A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_E7uQu8Tpatagwh-zec_V9A"].zpelem-image { border-style:none; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/cookieprocess_Explanation.png" size="fit" data-lightbox="true" style="height:325px;width:496.48px;"/></picture></span></figure></div>
</div><div data-element-id="elm_e30EK4GJctFeDDjbV38oeA" data-element-type="text" class="zpelement zpelem-text zp-hidden-sm zp-hidden-xs "><style> [data-element-id="elm_e30EK4GJctFeDDjbV38oeA"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></div>
</div><div data-element-id="elm_ABWPP59iSUFIn2WoDtJGzg" data-element-type="text" class="zpelement zpelem-text zp-hidden-md zp-hidden-xs "><style> [data-element-id="elm_ABWPP59iSUFIn2WoDtJGzg"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></blockquote></blockquote></blockquote></div>
</div><div data-element-id="elm_C_nCuT_nP9ZlEW6vI6mGJg" data-element-type="text" class="zpelement zpelem-text zp-hidden-md zp-hidden-sm "><style> [data-element-id="elm_C_nCuT_nP9ZlEW6vI6mGJg"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">How cookies are made.</span></p></div>
</div><div data-element-id="elm_v_zZmftuWmx4dRvU1hNsug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_v_zZmftuWmx4dRvU1hNsug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Type of Cookies</span></b><br></span></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">There are two main types of web cookies: session cookies &amp; persistent cookies.&nbsp; &nbsp; &nbsp;</span>&nbsp; &nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">Session Cookies&nbsp;</span></b><b></b><span style="font-size:12pt;">are temporarily stored in the web browser’s memory and deleted when the web browser is closed. These types of cookies are typically used to power an e-commerce website by remembering the items in your shopping cart, even if you leave the website. Additionally, they will save any specific preferences you’ve set on a website such as language or location. These cookies are more helpful than harmful and upon closing your web browser, the cookie data is deleted.&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">Persistent Cookies</span></b><span style="font-size:12pt;"> are stored for longer time periods within the web browser and remain intact even if the browser is closed; however, they typically have an expiration date. These types of cookies are utilized every time the user visits that website. Typically, this type of cookie allows a website to remember a specific device and user login, making the login process a bit easier. For example, many banks include an option to remember your account when logging into an online banking account on a specific device. If the user checks this box, the bank will not require the tedious multi-factor authentication or answers to security questions every time the user logs in to their bank account on that one device.&nbsp;Below are three different banks that allow users to opt-in to using persistent cookies on their devices.&nbsp;</span><span style="font-size:12pt;"><br></span></span></p></div>
</div></div><div data-element-id="elm_SzgOpM0M6EDHy36wniYy9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_SzgOpM0M6EDHy36wniYy9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_1BJ0TQuBB2FhJkVZ1vPNzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1BJ0TQuBB2FhJkVZ1vPNzA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uBNMKS_YA09BnrXhhvdQZA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_uBNMKS_YA09BnrXhhvdQZA"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/BOAPersistentCookie.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_WjN1v1pylEteuLu7ux0z0g" data-element-type="text" class="zpelement zpelem-text zp-hidden-sm zp-hidden-xs "><style> [data-element-id="elm_WjN1v1pylEteuLu7ux0z0g"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">Examples of frequently used persistent cookies</span></p></div>
</div></div><div data-element-id="elm_H2Hi881fQZOkfMm7QV8iVg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_H2Hi881fQZOkfMm7QV8iVg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Czvyb5DEsay_HfFqCuTRuA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Czvyb5DEsay_HfFqCuTRuA"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/CapOneLogin.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_gMgYAcp99fXkzdRf8vH3Ag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gMgYAcp99fXkzdRf8vH3Ag"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_sSow-Qqv6iwQ6qVu3HcM9w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_sSow-Qqv6iwQ6qVu3HcM9w"].zpelem-image { border-style:solid; border-color:#000000 !important; border-width:3px; border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/For%20Newsletter/ChaseLogin.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_TLkuAckPiJbt2088fd6u2A" data-element-type="text" class="zpelement zpelem-text zp-hidden-md "><style> [data-element-id="elm_TLkuAckPiJbt2088fd6u2A"].zpelem-text { border-radius:1px; margin-block-start:0px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="line-height:1;"><span style="font-style:italic;color:rgb(0, 0, 0);font-size:12px;font-weight:bold;">Examples of frequently used persistent cookies</span></p></div>
</div></div></div></div></div><div data-element-id="elm_Udu2QzBDTxYqwGq9ZWmoFQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Udu2QzBDTxYqwGq9ZWmoFQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-OoHWeNCaDs2YWs4pAQ51g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-OoHWeNCaDs2YWs4pAQ51g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_7BqOZtDylhh6VcFBnljEKA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7BqOZtDylhh6VcFBnljEKA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><p><span style="color:rgb(0, 0, 0);"><b><span style="font-size:14pt;">Cookie Issuers</span></b><br></span></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">Cookies are either created by a first-party issuer or third-party issuer.&nbsp;&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:rgb(0, 0, 0);"><b><span style="font-size:13pt;">First-Party Cookies </span></b><span style="font-size:12pt;">are created by the website that you are currently visiting. Many websites offer a cookie preference tab that lets the user choose the cookies they want turned on. Some cookies are essential to utilizing the web page which cannot be turned off, while others like analytics or marketing cookies can be turned off. These types of cookies are used by the company to track the effectiveness of the site's user experience or of a marketing campaign and are typically separated from any personally identifiable information.&nbsp;</span></span></p><p>&nbsp; &nbsp;&nbsp;<b style="color:rgb(0, 0, 0);"><span style="font-size:13pt;">Third-Party Cookies</span></b><span style="color:rgb(0, 0, 0);font-size:12pt;"> are cookies created by a website that you are not currently visiting—they&nbsp;typically come from online advertisements so companies can track what website a user was visiting when they clicked on the ad. If there is an ad on the website, it is likely that the ad owner and whoever else sells the digital ad space have cookies enabled for tracking the user's activity. These are typically persistent cookies that stay on the computer and track the user's long term activity. Since Google is one of the major digital advertisement providers, Google is tracking the long term activity on a user's web browser. While it may seem like an invasion of privacy, the reason for tracking a user's activity is to provide them with a tailored ad experience where ads the user sees are relevant to their searches and internet activity.&nbsp;</span><br></p><p><span style="font-size:9pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);">Cookie Stealing&nbsp;</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">There are a few different methods a hacker can utilize to steal a user’s cookie data; however, they are very complex and not frequently used.&nbsp;The best way to protect yourself from cookie fraud is to keep your web browser up to date.&nbsp;Most web browsers update automatically; however, if yours does not, make sure to be regularly checking for updates because in doing so,you are ensuring your web browser has the most up-to-date security.</span></p><p><b><span style="font-size:14pt;color:rgb(0, 0, 0);"><br> Privacy</span></b></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Typically, first-party and session cookies pose little risk to privacy concerns; however, persistent and third-party cookies are relatively invasive of individuals’ privacy. Since many advertisements on websites are powered by Google Adsense, Analytics, Maps, etc, the collected cookies provide Google with your internet activity. While marketing professionals will argue that the collected cookies help tailor advertisements to the user, the information collected by third-party cookies give people a justified concern about their privacy.</span></p> &nbsp; &nbsp;&nbsp;<span style="font-size:12pt;color:rgb(0, 0, 0);">Fortunately, browsers allow users to manage their cookie settings. On a desktop computer, Google Chrome, Firefox, Edge and Internet Explorer all offer cookie settings. Mobile devices also offer cookie settings within Apple iOS Safari, Chrome, Android's built in browsers and Blackberry's web browser. Since each browser is a little different there is not one process for turning the cookies off; however, a simple Google search of, &quot;[Your Browser] Manage Cookie Preferences&quot; will give you a list of articles explaining the process.&nbsp;Ultimately,there is no way around cookies, but managing the settings in your browser will help significantly with websites creating cookie files to collect your web activity, preferences or account information.&nbsp;</span></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 15:42:41 -0500</pubDate></item><item><title><![CDATA[Victims of Real Estate Wire Fraud]]></title><link>https://www.zwirentitle.com/blogs/post/Victims-of-Real-Estate-Wire-Fraud</link><description><![CDATA[7 Victim Stories detailing how cybercriminals have defrauded real estate transactions.&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Many cases of real estate wire fra ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_JdHti-36gS7c0V2-Zx84DA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_JdHti-36gS7c0V2-Zx84DA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EAEJVzrkdxrdi5upogMZXw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start zp-hidden-xs " data-equal-column=""><style type="text/css"> [data-element-id="elm_EAEJVzrkdxrdi5upogMZXw"].zprow{ border-radius:1px; } </style><div data-element-id="elm__XUgJ9cdG4-K03FfcYtvrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__XUgJ9cdG4-K03FfcYtvrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_rfJ3qjm5_cP1F0mPvJHBVQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_rfJ3qjm5_cP1F0mPvJHBVQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3Wb-zsUQkJrFIal2LlbCrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3Wb-zsUQkJrFIal2LlbCrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_k95dI88A9G2PArwEppzJMQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_k95dI88A9G2PArwEppzJMQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><div><div style="line-height:1.2;"><div style="line-height:1.2;"><p style="text-align:center;"><span style="font-size:16px;">7 Victim Stories detailing how cybercriminals have defrauded real estate transactions.&nbsp;</span></p><p style="text-align:center;"><br></p><p><span style="font-size:16px;">&nbsp;&nbsp;&nbsp;&nbsp;Many cases of real estate wire fraud go unreported in the media and to the FBI. However, the FBI Internet Crime Complaint Center (IC3) reproted 11,300 victims in 2018 leading to $149 million in losses, and 9,645 victims in 2017 with $56 million in losses. Below are some real stories of people who became victims of real estate wire fraud.&nbsp;</span></p></div></div></div></div></div></div></div>
</div><div data-element-id="elm_Ltg3MNnsXt5Jl2Gmduwdzw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Ltg3MNnsXt5Jl2Gmduwdzw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/CyberCriminal_Phone.png" size="small" data-lightbox="true" style="width:467px;"/></picture></span></figure></div>
</div></div></div></div></div></div></div><div data-element-id="elm_RvAzPIB7SA2qE3WeGPkGow" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wjWu3AqGSeC56lLqvFMt1g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_wjWu3AqGSeC56lLqvFMt1g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_VLvxEeEuRV67cqggXjdhgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_eCIBc7zldLru0NeNr274-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eCIBc7zldLru0NeNr274-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><div style="line-height:1.2;"><p align="center" style="text-align:center;"><span style="color:rgb(0, 0, 0);"><span style="font-size:24px;">Utah: Elderly Buyers Defrauded</span></span><span style="text-align:left;">&nbsp; &nbsp;&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="color:inherit;font-size:12pt;">In Utah, an elderly couple received wire instructions from their real estate agent via email. Within the email, the agent added, “I will be in a workshop all day, so don’t try to call me.” Being considerate of the agent's schedule, the couple wired the funds without calling to confirm the instructions.&nbsp;</span></p><span style="color:inherit;"><p></p><p>&nbsp; &nbsp; I<span style="font-size:12pt;">t wasn’t until the real estate agent received a call from the title company, requesting the buyer’s down payment that they realized the funds had been sent to a cyber criminal. Unfortunately, the elderly couple was not able to recover their $91,000.&nbsp;</span></p></span></div></div></div></div>
</div><div data-element-id="elm_lIaR1XLeP9OLzvY-DYgYVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lIaR1XLeP9OLzvY-DYgYVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><div style="line-height:1.2;"><p align="center" style="text-align:center;"><span style="font-size:24px;text-align:left;color:rgb(0, 0, 0);">Chicago: Buyers Defrauded from Spoofed Attorney Email</span><span style="text-align:left;"><span style="color:rgb(0, 0, 0);">&nbsp;&nbsp;</span></span><span style="text-align:left;">&nbsp;&nbsp;</span><span style="font-size:12pt;text-align:left;">&nbsp;</span><span style="text-align:left;">&nbsp; &nbsp;</span></p><p style="text-align:left;">&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">In Chicago, buyers received an email from their real estate attorney's assistant, with wire instructions attached. The attachment, on the attorney's letterhead, included the address of the property, the title company's information and the exact balance owed: $307,000.&nbsp;&nbsp;</span></p><p style="text-align:left;">&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">The buyer's sent the wire but the attorney never received the funds. They later discovered that cyber criminals spoofed the assistant’s email address, sending fake wire instructions that contained their own banking information. Therefore, the down payment was wired to the cyber criminals and not the attorney. The funds were not recovered, causing the victims to lose the entire $307,000.</span><span style="font-size:12pt;">.&nbsp;</span></p></div></div></div></div>
</div><div data-element-id="elm_8F9-FJp4s2eMQ3EIQ3ppgQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8F9-FJp4s2eMQ3EIQ3ppgQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><div style="line-height:1.2;"><p align="center" style="text-align:center;"><span style="font-size:24px;color:rgb(0, 0, 0);">Colorado: Realtor Wired Buyer Funds&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">An&nbsp;attorney handling a settlement in Colorado received a request for wire instructions to the escrow account from the buyer's realtor. Another attorney at the firm emailed the realtor with an attachment containing the wire instructions on the law firm's letterhead. There was nothing suspicious about the attachment so the realtor forwarded the instructions to the buyer. The buyer wired their money the day before closing. The following day, at the closing table,&nbsp; the settlement attorney made it clear that they did not receive the $180,000 down payment from the buyer. They soon realized that the wire instructions the realtor had received were fake. Hackers had copied the attorney’s letterhead and put their own bank account information on the attachment .&nbsp;</span></p><p><span style="color:inherit;"></span></p><p><span style="font-size:12pt;">&nbsp; &nbsp; They tried to recover the funds right away by calling the receiving bank; however, all but ten percent had already been sent to another account, at another bank. They contacted the FBI, who was, fortunately, able to freeze the entire $180,000; however, it took several months for the banks to return the funds to the buyers.&nbsp;The buyers had to cancel their contract on the new home and purchased a heavily mortgaged townhouse instead. Once their funds were fully recovered and accessible, they were able to pay off the townhouse's mortgage.</span></p></div></div></div></div>
</div><div data-element-id="elm_iq5jNKr3J7sKdF15Hjgq3Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iq5jNKr3J7sKdF15Hjgq3Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;line-height:1;"><span style="text-align:left;">&nbsp;<span style="color:rgb(0, 0, 0);"> &nbsp;&nbsp;</span></span><span style="font-size:24px;text-align:left;color:rgb(0, 0, 0);">New Jersey: Mortgage Payoff Defrauded</span></p><p style="text-align:justify;line-height:1;"><span style="text-align:left;">&nbsp; &nbsp;&nbsp;</span><span style="font-size:12pt;">Three weeks after closing and receiving their proceeds, a New Jersey couple, who had just sold their house, received an email from their bank stating their payment on their old mortgage was successful. They called their bank to question the payment because that mortgage should have been paid off after closing and discharged soon after. They soon discovered that after the closing, the mortgage was never paid off and no discharge of mortgage was ever filed.</span></p><p style="line-height:1.2;"><span style="color:inherit;"><span style="font-size:12pt;">&nbsp;Further investigation revealed that their attorney's email account had been compromised. Therefore, prior to closing, the hacker was reading all of the emails about the couple's transaction and when the couple had forwarded the lender's payoff information to their attorney, the hacker was able to see all all. Using the lender's payoff document as a template, the hacker created a replica that listed their own bank account information.</span></span><br></p><p style="line-height:1.2;">&nbsp; &nbsp;&nbsp;<span style="color:inherit;font-size:12pt;">The hacker then used the attorney's email account to send the fraudulent payoff document to the settlement company. Subsequently, instead of wiring the mortgage payoff to the lender, the title company wired the&nbsp;</span><span style="color:inherit;">$239,000 straight to the hacker.</span><span style="color:inherit;"><span style="font-size:12pt;"><br></span></span></p><p style="line-height:1.2;">&nbsp; &nbsp; After 16 months of communication between the lender, title company, the title company's insurance provider, the couple's mortgage was finally paid off and mortgage discharge paperwork was filed.&nbsp;</p></div>
</div><div data-element-id="elm_h609SZUiFATplHry77EeiQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h609SZUiFATplHry77EeiQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><div style="line-height:1.2;"><p align="center" style="text-align:center;line-height:1.2;"><span style="font-size:24px;color:rgb(0, 0, 0);">Oregon: Life Savings Gone Forever</span><br></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">In&nbsp;September 2016 a Washington lender's email account was compromised which led to a real estate broker's email account getting compromised. With access to both a lender and broker's email accounts, cyber criminals were able to learn all of the&nbsp; buyer’s personal information and the nuances of their transaction.&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">The title company received wire instructions from the realtor and distributed the funds accordingly. After closing and disbursement&nbsp;of funds, the seller realized they were missing $60,000 of their proceeds. When the seller realized they never received their payoff, they contacted the title company, who immediately contacted their bank and the bank where the money was wired.&nbsp;Ultimately, $25,000 was able to be recovered.</span></p><p align="center" style="text-align:center;"><span style="color:inherit;"></span></p><p><span style="font-size:12pt;">&nbsp;The title company’s email accounts were never compromised; however, they were the recipients of the fake wire instructions that appeared legitimate. The title company claims they they had been training their team on wire fraud&nbsp; and still ended up falling for the scam.&nbsp;</span></p></div></div></div></div>
</div><div data-element-id="elm_ATg-1MPhYGf693uMlOWyuA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ATg-1MPhYGf693uMlOWyuA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><div style="line-height:1.2;"><p style="text-align:center;line-height:1.2;">&nbsp;<span style="color:rgb(0, 0, 0);"> &nbsp;<span style="font-size:24px;">Michigan: Buyers Recover more than half of Defrauded Funds</span></span>&nbsp;&nbsp;</p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">The day before closing, a&nbsp;</span><span style="font-size:12pt;">buyer in Michigan received their wire instructions via email. They subsequently, wired their funds as instructed. The following day their real estate agent called the buyer, reminding them to bring a $135,000 check to the closing for their down payment.&nbsp;</span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">The buyers soon realized the wire instructions they&nbsp;received were&nbsp;fraudulent and they had already sent their down payment directly to a cyber criminal. They immediately notified their bank and the receiving bank and along with the FBI in attempt to retrieve their funds.&nbsp;Because they acted quickly, these buyers were able to retrieve $120,000 of their down payment.</span>&nbsp; &nbsp;&nbsp; &nbsp;</p><p></p><p align="center" style="text-align:center;"><span style="color:inherit;"></span></p><p>&nbsp; &nbsp;<span style="font-size:12pt;">While these buyers were lucky enough to get a majority of their money back, they still ended up losing $15,000 to cyber wire fraud.&nbsp;</span>&nbsp; &nbsp;&nbsp; &nbsp;</p></div></div></div></div>
</div><div data-element-id="elm_VSjEGGXssSqkl_Ml3zpJKw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VSjEGGXssSqkl_Ml3zpJKw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><div style="line-height:1.2;"><p align="center" style="text-align:center;"><span style="text-align:left;"><span style="color:rgb(0, 0, 0);font-size:24px;">Title Company Wires Funds to Fraudulent&nbsp;Account</span></span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">In&nbsp;September 2016 a Washington lender's email account was compromised which led to a real estate broker's email account getting compromised. With access to both a lender and broker's email accounts, cyber criminals were able to learn all of the&nbsp; buyer’s personal information and the nuances of their transaction.&nbsp;</span>&nbsp; &nbsp;&nbsp;</p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">The title company received wire instructions from the realtor and distributed the funds accordingly. After closing and disbursement&nbsp;of funds, the seller realized they were missing $60,000 of their proceeds. When the seller realized they never received their payoff, they contacted the title company, who immediately contacted their bank and the bank where the money was wired.&nbsp;Ultimately, $25,000 was able to be recovered.</span>&nbsp; &nbsp;&nbsp;</p><p align="center" style="text-align:center;"><span style="color:inherit;"></span></p><p><span style="font-size:12pt;">&nbsp;The title company’s email accounts were never compromised; however, they were the recipients of the fake wire instructions that appeared legitimate. The title company claims they they had been training their team on wire fraud&nbsp; and still ended up falling for the scam.&nbsp;</span></p></div></div></div></div>
</div><div data-element-id="elm_1f6VthaliOp9nsgNdQoS5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1f6VthaliOp9nsgNdQoS5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="line-height:1.2;"><div style="line-height:1.2;"><p><span style="font-size:12pt;">&nbsp; &nbsp;&nbsp;</span></p><p><span style="font-size:12pt;"><br></span></p><p><span style="font-size:12pt;"><br></span></p><p>&nbsp; &nbsp;&nbsp;<span style="font-size:12pt;">While some of these victims were able to retrieve all or a portion of the funds they lost, it is more common that people end up losing everything. These seven victim's stories confirm the significance of educating team members <i>and</i> the end consumer on cyber wire fraud&nbsp;because hackers will target anyone in the transaction that is wiring money.&nbsp;</span></p><p><span style="color:inherit;"><span style="font-size:12pt;">&nbsp; &nbsp;Try to agree in advance who will manage the wiring process.&nbsp;Don't trust bank account details and payment instructions sent via email until they are confirmed in person, if possible, or over the phone, using a trusted phone number.&nbsp;Additionally, consider creating an emergency response plan that establishes what to do and who to contact after a fraud occurs. Typically, both the sending and receiving bank should be contacted, along with law enforcement, and all parties involved in the transaction. Those who act quickly after funds are wired, have the best chance at retrieving all or a portion of the funds.&nbsp;</span></span><br></p></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 03 Jan 2020 14:26:40 -0500</pubDate></item></channel></rss>