Cyber Safety Net Cyber Safety Net Cyber Safety Net Cyber Safety Net
Navigation
  • Home
  • Artificial Intelligence
  • Cybersecurity Solutions
    • x360 Recover Gets You Back in Business FAST After Disasters or Ransomware
    • Rise of Ransomware Contact
    • Disaster Recovery Test Lets You Stop Worrying
    • Ransomware Recovery Test Lets You Stop Worrying
    • HIPAA
    • Training
    • Protection
    • PCI-DSS Audit
    • 14 Ways to Protect Your Practice from a Cyber Attack
    • 14 Ways to Protect Your Business from a Cyber Attack
    • Penetration Testing Authorization
    • Red Flags of Rogue URLs
  • Blog
  • About
    • Certifications
    • Rise of Ransomware Contact
    • Contact
    • Security Contact
Three Mile Island unit 1 coming back online, thanks to Microsoft and AI.

How Microsoft is Powering AI with Three Mile Island

Three Mile Island: From Meltdown to Microsoft's AI Power Play Remember Three Mile Island? That nuclear plant south of Harrisburg, Pennsylvania that gave us all a scare back in 1979? Well, it's making a comeback, and this time it's got Microsoft muscle (and money) in its corner. A Brief History Lesson Three Mile Island was home to two nuclear reactors. In March 1979, Unit 2 suffered a partial meltdown, causing the worst commercial nuclear accident in U.S. history. While Unit 1 kept chugging along, it eventually closed in 2019 due to economic pressures. Producing electricity there was more expensive than other providers using cheaper natural gas. New Owner, New Expectations Constellation Energy now owns three Mile Island. That's not the only nuclear power plant Constellation owns. Here's a partial list: ... Read More
February 7, 2025Mark Anthony Germanos
The California Consumer Protection Act (CCPA) protects Californians' privacy

Why use 2-Factor Authentication?

2-factor Authentication helps protect your identity. You should deploy 2-factor Authentication. This increases your security and reduces your chances of becoming an identity theft victim. Most services encourage 2-factor Authentication and let you deploy it at no additional cost. Here's a quick question for you. When attempting to access a website, the website can challenge you based on: A) What you know (e.g. password). B) Who you are (e.g. fingerprints). C) What you have (e.g. phone). D) All of the above. Correct answer: D. How it looks in real life. Daisy runs a dental office in Folsom, CA. Keeping the practice up and running is her top priority. She runs most of her patient, insurance and vendor communications through her Gmail account. She deploys 2-factor Authentication with the steps at https://myaccount.google.com/signinoptions/two-step-verification/enroll-welcome. She keeps her smartphone nearby. ... Read More
February 7, 2025Mark Anthony Germanos
social media connection request from Lynne

You have a new social media connection request from Lynne

Social media connection requests are not always real Meet Lynne. She sent you a social media connection request. Here's some background on Lynne. Happily married to a professional athlete. Real estate agent in San Francisco. Runs three marathons a year. Promised her mom she would visit all seven continents before turning 50. Laughs and walks away when you try talking politics.   Would you accept a social media connection request from Lynne? She looks decent and honest, right? Fake profile Think twice. She is fake. I visited https://www.thispersondoesnotexist.com/ and chose three pictures for my book. I wrote the profiles from scratch. https://www.thispersondoesnotexist.com/ uses a generative adversarial network, defined at https://en.wikipedia.org/wiki/Generative_adversarial_network to create pictures. Wikipedia tells us “a GAN trained on photographs can generate new photographs that look at least superficially ... Read More
February 7, 2025Mark Anthony Germanos
Protect your patients' charge card and debit card data. Perform PCI-DSS audits annually and vulnerability scans quarterly.

HHS Accounces New Final Rule Protecting HIPAA Entities and Individuals

HHS announces new rules The federal Office for Civil Rights (OCR), part of the Department of Health and Human Services, announced today the issuance of the final conscience rule that protects individuals and health care entities from discrimination on the basis of their exercise of conscience in HHS-funded programs. Just as OCR enforces other civil rights, the rule implements full and robust enforcement of approximately 25 provisions passed by Congress protecting longstanding conscience rights in healthcare. The final rule fulfills President Trump’s promise to promote and protect the fundamental and unalienable rights of conscience and religious liberty, a promise he made when he signed an executive order in May 2017 protecting religious liberty.  In October 2017, the Department of Justice issued guidance encouraging other Departments, including HHS, ... Read More
October 8, 2024Mark Anthony Germanos
Watch for fake security alerts

Office Depot Used Fake Malware Scans to Sell Unneeded $300 Services

Office Depot found malware in scans...not really Office Depot and its tech partner tricked customers into buying unneeded tech support services by offering malware scans that gave fake results, according to the FTC (Federal Trade Commission). Consumers paid up to $300 each for unnecessary services. The FTC yesterday announced that Office Depot and its software supplier, Support.com, have agreed to pay a total of $35 million in settlements with the agency. Office Depot agreed to pay $25 million while Support.com will pay the other $10 million. The FTC said it intends to use the money to provide refunds to wronged consumers. Office Depot caught claiming out-of-box PCs showed “symptoms of malware” Between 2009 and 2016, Office Depot and OfficeMax offered computer scans inside their stores using a "PC Health Check" ... Read More
September 30, 2024Mark Anthony Germanos
Save money. Do not fall for this rip off.

Watch Out for Triton, the World’s Most Murderous Malware

Triton got into a petrochemical plant In the summer of 2017, a petrochemical plant in Saudi Arabia experienced a worrisome security incident that cybersecurity experts consider to be the first-ever cyber attack carried out with “a blatant, flat-out intent to hurt people.” The attack involved a highly sophisticated new malware strain called Triton, which was capable of remotely disabling safety systems inside the plant with potentially catastrophic consequences. It all started when someone launched a spear phishing attack and someone else clicked a link they should not have clicked. Luckily, a flaw in the Triton code triggered a safety system that responded by shutting down the plant. If it hadn’t been for that flaw, the hackers could have released toxic hydrogen sulfide gas or caused explosions. As ... Read More
September 30, 2024Mark Anthony Germanos
Protect your patients' charge card and debit card data. Perform PCI-DSS audits annually and vulnerability scans quarterly.

Don’t Add Your Name to the Wall of Shame – Internet Thieves Will Find You

Phishing and File Sharing Internet thieves have long used file sharing sites and services to host their malicious files. When they do this, they typically use the underlying service to generate download links that anyone can click without logging in to the hosting service. Over the past month we started noticing apparently legitimate Dropbox emails pushing links to files with names suspiciously similar to those routinely used by the bad guys. When we clicked the links to check, however, we were greeted with a demand to log in to the service. That's typically been a sign that the files involved were legit. Still, something wasn't right here. Given the file names presented, we reckoned there was little chance those files were innocuous. So, we decided to log in to ... Read More
September 30, 2024Mark Anthony Germanos
Watch for fake security alerts

Georgia county pays $400,000 to get rid of a ransomware infection

Ransomware knocked most systems offline Officials in Jackson County, Georgia, paid $400,000 to cyber-criminals this week to get rid of a ransomware infection and regain access to their IT systems. The County hired cyber-security consultant to negotiate ransom fee with hacker group. Jackson County officials have not yet confirmed how hackers breached their network. The infection forced most of the local government's IT systems offline, with the exception of its website and 911 emergency system. "Everything we have is down," Sheriff Janis Mangum told StateScoop in an interview. "We are doing our bookings the way we used to do it before computers. We're operating by paper in terms of reports and arrest bookings. We've continued to function. It's just more difficult." Jackson County officials notified the FBI and hired a cyber-security consultant. ... Read More
September 30, 2024Mark Anthony Germanos
Watch for fake security alerts

What the Office Depot Fraud Would Look Like in Other Industries

Office Depot $300 scam - yes, it really happened I'm sure you've heard something about the Office Depot $300 fraud. For a thorough explanation, see https://cybersafetynet.net/office-depot-faked-malware-scans-to-sell-unneeded-300-tech-services/. Basically, Office Depot's malware scan reported malware on computers that did not have malware. Office Depot then sold an unnecessary $300 service. Today I am writing about how that would look in other industries. We have a high level of trust in those who provide professional services. We go to them when we sense a problem and need their training, judgement and professionalism to turn the problem into a solution. Let's see how this would play out in another industry. Electrical Your kitchen has a refrigerator, microwave oven and coffee maker. You discover that you can run two at the same time, but ... Read More
September 30, 2024Mark Anthony Germanos
Still vulnerable to cyber attacks and ransomware

New Facebook Phishing Scam is So Good It Can Fool Anybody

Is this the best Facebook phishing scam ever? Scams seeking to harvest online credentials have long tried to replicate known logon pages. But this newly found instance is just about perfect. In every scam that uses social engineering, the key is to be believable. If it looks right, feels right, has the timing right, etc., the victim is more likely to fall for it. This latest scam seeks to take advantage of a user’s desire to leverage single sign-on (SSO) via well-known websites. In this case, Facebook. Rather than creating (and remembering) countless passwords for an equivalently large number of websites, users will take advantage of identifying themselves via Facebook. Under normal circumstances, a Facebook API is called which prompts the user to authenticate. But researchers at security vendor Myki have ... Read More
September 30, 2024Mark Anthony Germanos
  • Previous
  • 1
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next

Search

Recent Posts

  • AI: Do You Feel People Who Use AI Get More Done in Less Time?
  • AI: When people mention AI, do you feel lost?
  • You have a new social media connection request from Cassandra
  • Be smart and save money on your Internet domain renewals
  • Is Creativity at Risk? The Fight for Intellectual Property in an AI-Driven World!
  • AI: Do you want to learn AI and stay ahead of the curve?
  • How to secure your printer’s WIFI backdoor before hackers crack it
  • ChatGPT Privacy: What You Need to Know Before You Type
  • New Ransomware Surges as Insurance Companies Now Pay Off Ransoms
  • Ransomware Hits Georgia County and Thieves Get $400,000 Payoff

© 2026. Cyber Safety Net. 3450 Palmer Drive #4-286. Cameron Park, CA 95682.
Full Disclosure: Some content here is generated by AI. The views expressed are the author's opinion and not legal advice. The author is not a lawyer. You are an adult and responsible for anything you do.