Extra New Jersey Home Page

Hot Bench

Judy Justice

U. S. Postal Office

IRS

How to protect yourself in prime tick season

Manhattan congestion pricing toll will go into effect June 30 [2024]

Police: Beware gift card

scammers

Omaha Steaks

Weather Tech

Cubii

Six Flags

us.gov

COVID.gov

ic3.gov

988 Suicide & Crisis Lifeline

NJ Reproductive Health Access

Common dog illnesses explained

AirNow.gov

Trump's NY Hush Money Trial

Menendez's Bribery indictment

Career Coach

Vantage Point

Job Info

Huntington Help

Federal Trade Commission

CFPB

Report Fraud

SaferProducts

White House

danielslaw.nj.gov

Virtual Meeting

Installing Zoom

Learn Zoom

Zoom Support

IdentityTheft.gov

Bad influence?

StaySafeOnline.com

NJSchoolJobs.com

Legoland.com/new-york

Pandemic Failure

Data Breaches

Whitehouse.gov

U S Supreme Court Rulings

COVIDTest.gov

imdb TV

Special Rep rot

IMPORTANT Bumbly Bee information about cars

New Jersey Deadline a year away to update license to Real ID

NJ DMV

Bankruptcies

IRS

Fraud Alert

FBI

ic3.gov

CDC.gov

Real ID Information

ReachNJ.gov

Tutor.com

New Jersey Hidden in Plain Sight

Our new health crisis is guns; it's time to act

Finding right college fit can be challenge

Parents. pay attention to teens on screens

American Dream

Big Snow American Dream

Protection sought for American bumblebee

How quitting Twitter can make you more productive

Flu/COVID combo vaccine in works

3 Red Flags To Help You Spot A Phishing Email

JerseyDinos.com

cyber.nj.gov

Telemedicine regulations complicate care

College loan relief application is ready. Here's how to apply

Cyber Security information for children & Teens

Breaking Down The Supreme_Court's Abortion Ruling

Bee's warning about leaving cars unlock in driveways

January 6th hearing information

Yard Sale

Health care experts offer tips on infant formula

NJ's bag ban will change how you shop for groceries

Here's how to navigate NJ plastic bag ban

NJ Ban on single-use carryout bags,  

As legal weed sales start, here are some basic facts - NJ

New York state Cannabis Info

Full-time vs. freelancing: Some tips

What to know before your firm adds buy now, pay later

Children of work visa immigrants face deportation as they turn 21

Scammers are using Ukraine crisis to take your money, groups warn

3 schemes scammers sue on people who owe utilities

FBI chief: threats from China reach 'new level'

Are dogs OK in the cold? Experts offer these safety tips as temperatures drop

How will free tests website work?

CDC recommends shorter COVID isolation, quarantine

Ransomware persists as problem

Intelligence center creation stalls over size and mission

As social media polices its platforms, truth must always prevail

COVID-19 and COVID vaccines

CVS maps path to primary care delivery

The darker web

Can social media sites stop abuse?

Who to contact if you suspect child abuse or neglect

We must keep America safely housed

Kids scared of shots? Here's what to tell them

Concerned about side effects?

Enhanced 911

Ransomware gang says it targeted National Rifle Association

FTC warns companies, consumers about fake reviews

Feds could sue for failure to report cyber breaches

Fake COVID-19 vaccination cards are illegal, dangerous

Facebook exec defends policies on young people amid criticism

Storms haven't fazed Facebook, but Instagram Kids might

Host your own live shopping event

Apps can make trading feel like a game, but at what risk?

Doctors puzzle over why millions can't shake COVID

What to know about vaccinating children

New tool lets users see nursing home vaccine data

4 tips for preparing your home for severe weather

A New Jersey's guide to dining in NYC

Toys R Us plan comeback, opening shop in Macy's

To mask or not to mask? A guide on latest advice

Why small companies should stop doing business on Amazon

Is your wedding budget ready for the reception resurgence?

Strange car rental scams overheat as summer approaches

Schools deal with stress, depression harming students [NJ]

Experts: Many in US will lie about vaccines

ATF lets problem dealers off hook

On a Social Security quiz, most people get a 'D'

US takes new aim at ransomware after costly year

Shootings prompt a need to be ready

Increase in employment Scams

To rise financially savvy kids, rethink your money lessons

Education Department reverses rule on loan forgiveness

Important Information Regarding Security Incident

Surprising things renters insurance covers, doesn't

App can say if you've been near a virus patient

FORCED TO ADAPT

Rise in youth suicides puzzles experts

New to Online banking? Here are some tips

Domestic violence calls more severe

Expansion for telehealth eyed beyond pandemic

Zoom sees business boom and expects to keep growing

Ten pieces of advice for new investors

Official warns malicious e-mails on rise

Apple, Google team up to notify of exposure to virus

Coronavirus

WHO warns about lack of contact tracing

Cybercrimals are using concerns about the coronavirus to launch phishing attacks

While COVID-19 Tactics Increase, Traditional Phishing Still Circulating

HOW to tell if it's coronavirus or seasonal allergies

Virus aid blocked for DACA recipients, others

Child abuse expected to increase amid crisis

Guidelines-for-Opening-Up-America-Again

CDC advice detailed, restrictive

WHO officials warns that virus may be here to stay

Equifax Data Breach Settlement - Extended Claims Period Benefits

Now is time to make end-of-life decisions

Uber considers buying Grubhub, according to newspaper report

Uber adds hourly rate for trips with multiple stops

Amazon restricts face-recognition tech

Mall owners will buy JC Penney out of bankruptcy

Chinese drone maker hurt by rift with the US

WELCOME TO BUMBLY BEE

Bumblybee.net is an website that gives the latest information on different topic

If you would like to purchase me and my friends go to www.mypillowpets.com

If you like to wear me on your feet go to Bunnyslippers.com

To learn the truth about God's word, visit faithdome.org - To watch a live Sunday Service that starts at 10:30 AM PST, or bible Study - click on YouTube.com in the "search bar" type "ever increasing faith" and then 5 minutes before click on the "EIFM" button.

For Cyber Information go to: paloaltonetwork.com/CyberACES

Toys that can spy on kids are called a growing concern - Click Here

Learn tactics NJ utility scammers use and how you can avoid them - Click Here

New tools to help NJ home-buyers assess flood risk - Click Here - flooddisclosure.nj.gov

Deer face hazards not just on roads, but in backyards - Click Here

FAFSA delay complicates college entry - Click Here

Baby lounger sold on Amazon deemed unsafe - Click Here

Mysterious dog illness hits East Coast, but not NJ - yet - Click Here

Bumbly Bee wants to reminds users that any link to another website is tested first.

A Bee note: For the latest information, that has to do with New Jersey, on the left side of the Home page, click on "Passaic County" or Wayne Township NJ" to see the latest information.

 

A Bee Reminder:
..... It is very important that you take your Key Bobs inside your house. It is also important that you lock your cars even in your own driveways. Also it is important that you turn off your cars when getting gas or running into the store. This will cut down on your vehicles from getting stolen!!

Bumbly bee note: This items listed below that do not have who it was printed by, comes from either New Jersey Cybersecurity & Communications Integration Cell Weekly Bulletin or from Life Lock.

 

CDC says eye drops linked to infections:

By: Mike Stobbe
Associated Press

NEW YORK - U. S. health officials are advising people to stop using over-the-counter eye drops that have been linked to an outbreak of drug-resistant infections.
..... The Centers for Disease Control and Prevention on Wednesday [02/01/2023] night sent a health alert to physicians, saying the outbreak includes at least 55 people in 12 states, one died.
..... Disease investigators have linked the infection, including some found in blood, urine and lungs, to EzriCare Artificial Tears. Many of the patients said they had used the product, which is a lubricant used to treat irritation and dryness.
..... The infections were all caused by a bacteria called Pseudomonas aeruginosa. Investigators detected that kind of bacteria in open EzriCare bottles, but further testing was underway to see if the strains matched.
..... EzriCare said it is not aware of any evidence definitively linking the outbreak to the product, but that it has stopped distributing the eye drops. It also has a notice on its website urging consumers to stop using the drops.

LG to invest $4.5 billion in US battery operation:
..... LG Energy Solution will invest more than $4.5 billion in U.S. battery production by 2025 as more automakers commit to churning out electric vehicles sooner than anyone had expected.
..... The Korean company, which has a joint venture with U.S. automaker General Motors, said the investment will help crate 10,000 jobs, including subcontractors.
..... GM and LG are currently building a $2.3 billion battery factory in Lordstown Ohio, near Cleveland, that will employ about 1,000 people when it is completed in 2022.
..... General Motors has vowed to make its entire global fleet largely electric by 2035, even changing its corporate logo to include the likeness of an electric plug.

FTC Warns of Unemployment Benefit Scams

The Federal Trade Commission (FTC) warned of threat actors sending phishing emails and text messages purporting to be from state workforce agency (SWA) websites. These emails contain links that, if clicked, direct users to spoofed unemployment benefit websites requesting users to enter personally identifiable information (PII) or other sensitive information. This data can be used to apply for unemployment benefits and/or commit identity theft.

The NJCCIC encourages users to educate themselves and others on these continuing threats and tactics employed by threat actors in order to reduce victimization. Users are advised to look for signs of spoofing , refrain from clicking on links and attachments from unknown or unverified senders, confirm the legitimacy of a request via an alternate means of communication before taking action, navigate directly to official websites, and exercise caution when divulging information. We also advise victims of PII compromise and identity theft to review the NJCCIC Informational Report Compromised PII: Facilitating Malicious Targeting and Fraudulent Activity.

 

COVID-19-Themed Phishing Campaigns Continue

Threat actors continue to use COVID-19 themes in phishing emails in order to deliver malware or steal credentials. The NJCCIC has received an increased number of incident reports regarding these and similar-themed phishing attempts, consistent with open-source reporting. At this time, the US Department of Justice (DOJ) has seized five internet domains impersonating biotechnology companies that have been involved in COVID-19 vaccine development. The fake sites were used to collect visitor’s personal information to facilitate further cyberattacks. According the US Federal Trade Commission (FTC), roughly 372,000 Americans have reported financial losses of over $365 million due to COVID-19-related scams since the onset of the pandemic.

One reported campaign includes a link to a fictitious survey associated with receiving the vaccine. Some variations of this campaign may also offer a prize upon completion, such as a gift card or a free iPad. If clicked, the user is redirected to a domain controlled by threat actors in an attempt to harvest credentials. Some red flags associated with this campaign includes misspelled URLs, grammatical errors, and a sense of urgency to comply with the request.

https://ecp.yusercontent.com/mail?url=https%3A%2F%2Fimage.communications.cyber.nj.gov%2Flib%2Ffe3e15707564047c7c1270%2Fm%2F2%2FGSCTH%2B-%2B20210325.1.png&t=1617616773&ymreqid=953f4572-a0d6-9ef8-302b-1b002d01e600&sig=64wcJN29qur6OmTP5Roc5w--~D

Image Source: Inky

A similar campaign distributes fake notification emails that claim a coworker(s) has been diagnosed with COVID-19. These emails state that the recipient is required to review and complete sections of the associated policies and guidelines, or that changes have been made to these documents. The email portrays a sense of urgency and threatens that those who fail to complete the required sections will be regarded as non-compliant. The link directs the user to a compromised collaboration platform or document management tool such as SharePoint in an attempt to steal credentials. Unlike the previously-mentioned campaign, these emails are well-crafted and have very few, if any, grammatical errors. Upwards of 50 percent of attacks target user credentials, as detailed in Cofense’s Annual State of Phishing report. Oftentimes, one set of credentials is used as a single sign-on (SSO) option and could provide threat actors with access to several platforms. Additionally, users may reuse credentials across multiple accounts, providing threat actors the opportunity to compromise multiple accounts using one password, often exposed in data breaches.

 

US opens probe of steering problems in Honda sedans:
..... The U.S. government's auto safety agency is investigating multiple complaints about steering failures that could affect more than 1.1 million Honda Accord sedans.
..... In documents posted Monday, [05/10/2021] the National Highway Traffic Safety Administration says it received 31 complaints about the problem, and Honda has 77 more. Owners complained about a loss of steering control and the cares veering from their intended travel path. Two crashes and two injuries were reported.
..... The probe covers Accords from the 2013 through 2015 model years. The agency opened the probe after getting a petition from an owner in October of last year. [2020] It will investigate how often the problem happens., how many vehicles are affected, and the safety consequences of the problem. The probem could lead to a recall.

Trust in Government Online
Over the past month, the NJCCIC responded to a number of incidents involving fraudulent websites impersonating legitimate government websites in NJ and other states. A number of these sites were hosted overseas using newly created domains, while others were hosted on hacked websites of victim organizations in the US. Unsuspecting individuals were lured to these sites as a result of various phishing and SMiShing messages they received. Each of the fraudulent sites convinced unsuspecting victims that they were visiting an official government website and prompted them to enter their login credentials and/or sensitive information. Undoubtedly, that information will be used by the threat actors to perpetrate additional crimes.
The NJCCIC has reported on numerous phishing, vishing, and SMiShing schemes and provided good practices for protecting yourself from becoming a victim; however, cybercriminals continue to evolve and adjust their tactics, and some of these schemes have become more sophisticated and difficult to detect by the general public. Not everyone can be a Sam Spade or be expected to fully analyze every message they receive. To ensure websites are from an official government organization, they should provide the public with some assurance by using a .GOV top-level domain (TLD), as in NJ.GOVFBI.GOVCDC.GOV, etc. It is still very common for government organizations to use alternative TLDs, such as .US or .ORG, for their official websites; therefore, the lack of a .GOV TLD does not – by itself – indicate a malicious or spoofed site.
Beyond schemes to defraud, many authoritative-looking domains and websites are created to spread misinformation and disinformation, as we have seen over the past several years regarding elections, vaccines, and many other topics. Some authoritative-looking domains are registered solely for malicious purposes.
All levels of government have a responsibility to provide accurate information and provide trusted services to the public. An effective step in that direction is migrating vanity and other government domains using .COM, .NET, .ORG, etc. TLDs to .GOV, particularly now that .GOV TLDs are managed by the US Department of Homeland Security and are free to verified government organizations. For more information on migrating your public sector domain to .GOV, see https://home.dotgov.gov . Unfortunately, even if all government organizations migrate to a .GOV TLD, nefarious individuals and groups will continue to target the public with ever evolving cyber threat schemes.
The NJCCIC recommends users exercise caution when providing sensitive information either into a website or in response to a received communication. Always verify the source of a request, ensuring websites visited are official and navigating to them directly (not via links received via email or SMS text message). If you fall victim and your personally identifiable information (PII) or account credentials are compromised, there are steps that can be taken to reduce the impact of the information and data exposure. If personal information is revealed that could facilitate identity theft, the NJCCIC recommends placing a freeze on your credit profile. Credit freezes prevent anyone from opening a new credit account or line of credit using your information, and are free and do not impact your credit score. If financial information is revealed in a cyber threat scheme, inform your banking institutions immediately and notify them if you discover unauthorized purchases or changes to your account. Additionally, request new cards and/or account number where appropriate. If credentials – the combination of username/email address and password – are revealed, immediately change your password for the associated account(s) currently using the same password and enable multi-factor authentication, if it is not already in use. If you are unable to access your account with a password reset, contact the online service to alert them of the compromised account. Additional information and recommendations can be found in the NJCCIC product  Identity Theft and Compromised PII and the NJCCIC Account Security Webpage.

 

New Ford models can get software updates via Internet:

..... Ford says it is starting to send out over-the-Internet software updates to some of its newer models as it match electric car maker Tesla.
.....At present the updates are only available to about 100,000 owners of 2021 model year F-150s, Mustang Mach-Es and the upcoming Bronco, but Ford plans to spread the tech across its entire lineup as models are updated. It plans to make 33 million vehicles with the capability by 2028.
..... The updates can fix software glitches in nearly all of the vehicles' computers, and will be able to make recall repairs, offer new features and cut warranty claims, said Alex Purdy, the company's connectivity business director.
..... Ford says there are about 80 different computers in its most sophisticated vehicles that control everything from the infotainment center to breaks and transmission shifts.

Supreme Court: Mortgage overseer structure unconstitutional:

..... The Supreme Court on Wednesday [06/23/2021] gave the president greater power to fire the head of the agency that oversees mortgage giants Fannie Mae and Freddie Mac, ruling that the agency's structure violates the separation of powers principles in the Constitution.
..... Writing for a majority of the court, Justice Samuel Alito said that as the justices explained in a case last year, [2020] "the Constitution prohibits even 'modest restrictions; on the President's power to remove the head of an agency with a single top officer."
.... The ruling paves the way for President Joe Biden to remove Mark Calabria, who was nominated to head the Federal Housing Finance Agency in 2019 by then-President Donald Trump.

Judge dismisses antitrust lawsuits against Facebook:

..... A federal judge on Monday [06/28/2021] dismissed antitrust lawsuits brought against Facebook by the Federal Trade Commission and a coalition of state attorneys general, dealing a significant blow to attempts by regulators to rein in tech giants.
.... U.S. District Judge James Boasberg ruled Monday [06/28/2021] that the lawsuits were "legally insufficient" and didn't provide enough evidence to prove that Facebook was a monopoly. The ruling dismisses the complaint but not the case meaning the FTC could refile another complaint.
.... "These allegations - which do not even provide an estimated actual figure or range for Facebook's market share at any point over the past ten years - ultimately fall short of plausibly establishing that Facebook holds market power,: he said.
..... The U.S. government and 48 states and districts sued Facebook in December 2020, accusing the tech giant of abusing its market power in social networking to crush smaller competitors and seeking remedies that could include a forced spin-off of the social network's Instagram and WahtsApp messaging services.

High court won't hear florist's case:

Associated Press

WASHINGTON - the Supreme Court on Friday [07/02/2021] declined to take up the case of a florist who refused to provide services for a same-sex wedding, leaving in place a decision that she broke sate anti-discriminations laws.

..... Justice Clarence Thomas, Samuel Alito and Neil Gorsuch said they would have agreed to hear the case and review the decision. Four Justices are needed for the court to take a case..
..... In 2018 the high court ordered Washington sate court to take a new look at the case involving florist Barronelle Stutzman and her Arlene;s Flowers business. That followed the justices; decision in a different case involving a Colorado baker who declined to make a cake for a same-sex wedding.
.... After that review, the Washington Supreme Court ruled that state courts did not act with animosity toward religion when they ruled Stutzman broke the state's anti-discrimination laws by refusing to provide flowers for the wedding of Rob Ingersoli and Curt Freed.

China's Xi attacks calls for technology blockages:

..... Chinese leader Xi Jimping on Tuesday [07/06/2021] attacked calls from some in the U.S. and its allies to limit their dependency on Chinese suppliers and block the sharing of technologies.
..... In a speech to representatives of leftist political parties in more than 100 countries, Xi said China's ruling Communist Party has succeeded in raising the country from poverty and created a new model of development.
..... Such experiences should be shared and no country should :obstruct the development of other countries and harm their people's lives through political manipulation," Xi said.
..... Decoupling has become a byword from some in the U.S. and elsewhere for ending dependency on Chinese supply lines, especially for high-tech products such as smartphones and computers.

China criticizes us moves to expand financial sanctions:

BEIJING - China's government on Friday [07/09/2021] criticized new U.S. moves to reduce access to American financial markets and said it will protect Chinese companies but gave no indication of possible retaliation.
..... The S&P Dow Jones Indices and FTSE Russell removed more Chinese companies from their indexes after President Joe Biden expanded a blacklist of companies that are off limits to American investors. Such indexes are the basis for billions of dollars of investment in stocks and bonds.
..... A foreign ministry spokesman, Wang Wenbin, accused Washington of "abusing national power and generalizing the concept of national security to support Chinese enterprises for no reason."

Ford, Argo Al to deploy autonomous vehicle on Lyft network:

..... For motor Company and a self-driving vehicle company it partly owns will join with the Lyft rid-hailing service to offer autonomous rides on the Lyft network.
..... The service suing Ford vehicles and a driving system developed by Pittsburgh-based Argo Al will begin in Miami later this year [2021] and start in Austin, Texas, in 2022. It will stat with human backup drivers and go fully autonomous at an unspecified date.
..... The cars will gather data to lay the groundwork to deploy 1,000 robotaxis on the Lyft network in multiple markets during the next five years, the companies said Wednesday [07/21/2021] in a statement.

US looking into whether Ford was slow to recall cameras:

..... U.S. highway safety regulators are investigating whether Ford acted quickly enough when it recalled more than 620,000 vehicles last year [2020] to fix faulty rear-view cameras.
..... The National Highway Traffic Safety Administration also says it will look into whether the automaker should have recalled more vehicles.
..... documents posted Friday [08/06/2021] on the agency's website say Ford began the recall on September 23 [2020] because the backup camera displays can show a blank or distorted image.
..... The recall covered multiple Ford and Lincoln models form 2020 including the F-Series pickup, the nation's top-selling vehicle.

US probing whether Mercedes vans can roll away unexpectedly:

..... The U.S. government's highway safety agency is investigating whether some Mercedes-Benz Sprinter vans can shift out of park and unexpectedly roll away.
..... The problem by the National Highway Traffic Safety Administration covers an unknown number of vans from the 2019 model year. The agency says it has 11 complaints about the problem including eight crashes and one injury.
..... Some of the complaints say the gearshift indicator shows that the vans are in park, but they were able to roll away. One hit a house in Salt Lake City in September of 2020.

Peloton acknowledges subpoenas, SEC investigation:

..... Peloton has been subpoenaed by the Justice Department and the Department of Homeland security for documents and other information related to its reporting of injuries associated with its exercise equipment.
..... The company also said Friday [08/27/2021] that the Securities and exchange Commission is "investigating our public disclosures concerning these matters."
..... In May, [2021] Peloton recalled about 125,000 of its treadmills less than a month after denying they were dangerous despite the death of at least one child and injuries to 29 users.
..... The U.S. Consumer Product Safety Commission warned on April 17 [2021] that people with children and pets should immediately stop using the Tread+.

Unvaccinated face far more risk

By: Lauran Neergaard
Associated Press

..... New U.S. studies released Friday [09/10/2021] show the COVID-19 vaccines remained highly effective against hospitalizations and death even as the delta variant swept the country.
..... One study tracked over 600,000 COVID-19 cases in 13 states from April through mid-July. [2021]
..... As delta surged in early summer, [2021] those who were unvaccinated were 4.5 times more likely than the fully vaccinated to get infected, over 10 times more likely to be hospitalized and 11 times more likely to die, according to the Centers for Disease Control and Prevention.
..... "Vaccination works," Dr. Rochelle Walensky, CDC's director, told a White House briefing Friday. [09/10/2021] "The bottom line is this: We have the scientific tools we need to turn.
..... So-called "breakthrough" cases in the fully vaccinated accounted for 14% of hospitalizations and 16% of deaths in June and July, [2021] about twice the percentage as earlier in the year.[2021]
..... Walensky said Friday [09/10/2021] that well over 90% of people in U.S. hospitals with COVID-19 are unvaccinated.

US opens probe into ram diesel trucks; engines could stall

..... U.S. Safety regulators are investigating fuel pump failure in more than 600,000 diesel Ram trucks that could cause the engine to stall or lose power. the probe covers Ram 2500, 3500, 4500 and 5500 heavy-duty trucks with 6.7-liter cummins turbodiesel engines.
..... The National Highway Traffic Safety Administration says in documents posted on its website Monday [10/18/2021] that it received 22 complaints and two filed reports of engines stalling due to high-pressure fuel pumps failing. Agency documents say it has no reports of crashes or injuries.

Toyota unveils first EV since 2014

..... Toyota, the top-selling automaker in the U.S., is rolling out its first fully electric vehicle in eight years.
..... The company on Tuesday [04/12/2022] unveiled the battery-powered BZ4X small SUV, which starts at $42,000 and can go up to 252 miles per charge.
..... The bZ4X which will be sold globally, adds to the 38 electric vehicle models now on sale in the U.S., with more than 120 expected by 2025.
..... It is Toyota's first EV since 2014, when it last sold an electric version of the RAV4.

Employment Scams Continue
The NJCCIC received reports indicating an increase in employment scams. Scammers advertise fake employment opportunities through the same avenues legitimate employers use to seek talent, such as legitimate job boards. Within the last week, at least two identified employment scams were associated with a NJ medical facility that fell victim to a cyberattack and subsequent breach last year. Victims reported that these scams impersonated various departments and legitimate individuals, including recruiters, talent acquisition, human resources, and department managers. The scammers contacted the victims via LinkedIn regarding a work-from-home position, conducted interviews, and began communicating in non-traditional channels. In one instance, a fraudulent check payment was sent to the victim to establish a home office in order to establish credibility so the victim would complete hiring documentation and provide sensitive personally identifiable information (PII). In another incident, the scammer sent funds to set up a home office using a peer-to-peer mobile payment app, then asked the victim to purchase gift cards and provide the codes to the "equipment supplier." The gift card codes were sent to the scammer instead.
The NJCCIC recommends job seekers examine potential offers by contacting the human resources department directly via official contact information and conduct research online to determine if others have reported a scam before responding or providing sensitive information. Additionally, the NJCCIC recommends reporting the scam directly to the posting job board and the Federal Trade Commission and, in the event of theft or PII compromise, contact your local law enforcement department. Further recommendations and reporting resources can be found on the Fight Cybercrime webpage and the Employment Scams NJCCIC product.

 

Ransomware Attacks Continue to Target Education Sector
Ransomware attacks continue to plague the education sector in New Jersey and across the United States. These disruptive attacks have caused schools to cancel classes and exams, often spreading throughout districts, and in some cases, impacting municipalities or police departments. Roughly 1,000 schools in 62 districts were impacted by ransomware attacks in 2021. Though the number of reported ransomware attacks targeting the education sector are lower than this time last year, the FBI indicated that over half of all reported ransomware incidents targeted K-12 organizations. Analysts have also indicated that the cost of a ransomware attack, from ransom demands to recovery, has significantly increased.
The education sector has risen to a number of challenges over the last few years in dealing with the COVID-19 pandemic and conforming to the ever-changing Centers for Disease Control and Prevention guidelines, evolving physical threats, and increasing dependency on online services. The switch to online learning during the pandemic caused many districts to lower their cybersecurity barriers so that students and educators could access networks from various devices. This, coupled with a vast trove of data, high-tempo operations, and limited cybersecurity funding, has caused the education sector to be perceived as low-hanging fruit and an attractive target to cybercriminals. Cyberattacks on K-12 organizations not only disrupt students’ education, but they also have major implications on sensitive personal information and communications, such as email and virtual classroom platforms, and school budgets, ultimately impacting local taxes throughout the districts. Continue reading…

 

BlackCat Ransomware Updates
BlackCat, active since at least November, is a ransomware-as-a-service (RaaS) that uses a cybercriminal business model that includes access brokers, operators, and affiliates. The attack vectors used in BlackCat operations include exploiting remote access connections, using compromised accounts for network access, and exploiting Microsoft Exchange vulnerabilities. BlackCat is also known for engaging in “double extortion,” a tactic in which threat actors steal victim network data and threaten to publicly expose the data if a ransom payment is not received. In efforts to further shame victims and convince them to pay ransoms, the BlackCat group is now publishing victim data on individual sites and making the data searchable.
The NJCCIC recommends businesses and organizations implement cybersecurity best practices to combat ransomware, including a comprehensive data backup plan, cybersecurity user awareness training, endpoint detection and response, and multi-factor authentication for network access. Other ransomware risk mitigation strategies can be found in the NJCCIC technical guide. For more information on the BlackCat ransomware threat group, review the Microsoft Security blog post. BlackCat indicators of compromise (IOCs) are provided in the FBI FLASH.

 

Beware of Job Scams
Job vacancies are advertised on popular online employment boards and websites, in newspapers and other publications, or directly via communications such as email, social media, or SMS text messaging. Threat actors may spoof company websites and post fraudulent job vacancies to pose as legitimate employers. They may also target job seekers with scams to click links to fraudulent employment websites, open attachments falsely labeled as resumes or other employment information, deliver malware, steal funds, participate in illegal activities such as money laundering, or collect personally identifiable information (PII) that can be used to commit further malicious activity and fraud. Tactics and techniques used in job scams include urgent requests to respond, offers that are “too good to be true," and the impersonation of human resources recruiters, talent acquisition personnel, and department managers. Examples of job scams include work-from-home or remote work, nanny, caregiver, virtual personal assistant, mystery shopper, job placement service, and government and postal positions.
Job scams are increasing, as the Federal Trade Commission reported receiving more than double the number of job scams in 2021 compared to 2020, and more than 16,000 complaints have been filed in the first quarter of 2022. The NJCCIC continues to receive reports of job scams targeting individuals in New Jersey, especially students at colleges and universities who may be more open to flexible, remote work opportunities and the promise of quick cash. Young adults , especially high school and college students and university graduates, typically lack real-world experience in the professional workforce and could be more inclined to fall for job scams. Threat actors are targeting new graduates or current students seeking summer employment or upcoming fall positions. In the example above, the job vacancy and subject line convey a sense of legitimacy from a trusted source by claiming to be for a personal assistant position in the fall for the Federal Work Study Program, despite the “Employment” display name and the Gmail sender email address. Victims who viewed the message on a mobile device saw only the spoofed display name and not the associated Gmail email address; therefore, they may be more inclined to deem the communication legitimate. Additionally, the email includes an attachment that contains more information about the purported position along with instructions to respond back to an AOL account with their full name, address, phone number, age, and email address. One victim stated that once they submitted their information, they received a text message from an unknown number to confirm their identity. Threat actors can use the submitted information to contact victims and commit further malicious activity and fraud. The FBI warned of the use of stolen PII and deepfakes to apply for remote work positions, such as information technology and computer programming, database, and software-related job functions with access to PII, financial data, corporate databases, and proprietary information. During the interviews, the threat actors posing as applicants used voice spoofing or voice deepfakes in which the visual actions, such as lip movement, were not in alignment with auditory actions.
The NJCCIC recommends users and organizations reduce victimization by educating themselves and others on these continuing threats and tactics. Users are advised to avoid clicking links and opening attachments from unknown senders and exercise caution with communications from known senders. If a message’s legitimacy is unknown, contact the sender via a separate means of communication – such as by phone – before taking any action. Navigate to websites directly by manually typing the URL into a browser, instead of clicking on links delivered in communications, to ensure you are visiting the legitimate website and verify the posted job opening. In addition, job seekers are advised to research potential employers and businesses before responding or providing sensitive information. Requests for PII, such as a Social Security number or bank account number for direct deposit, should be considered a red flag when requested at the beginning of the application process. Also, be wary of interviews conducted remotely and over email only. If hired, ask for an employment manual or handbook, as threat actors typically are not able to provide these documents. Please review the Identity Theft and Compromised PII  NJCCIC informational report for additional recommendations and resources, including information on credit freezes and enabling multi-factor authentication (MFA) on accounts.
.
BEC and Gift Card Scams Continue
The NJCCIC continues to receive incident reports of business email compromise (BEC), such as invoice and gift card scams, attempting to steal personally identifiable information (PII), harvest account login credentials, or extort funds. Threat actors impersonate trusted entities, such as a CEO or fellow employee, often by establishing an email address with the employee’s name and utilizing display name spoofing in the messages. Threat actors are also using a new tactic in which the spoofed email domain contains a legitimate subdomain, but it is appended by a second subdomain (eg., Johnsmith@xyz[dot]org@gmail[dot]com, where "xyz[.]org" is not the actual email domain). The sender’s email address is often truncated in the viewing screen, especially on mobile devices, obscuring the full sender domain. The threat actor may send an invoice remittance or request the purchase of gift cards and corresponding codes.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. It is highly advised that users refrain from responding to unsolicited communications, clicking links, or opening attachments from unknown senders, and exercise caution with communications from known senders. If unsure of the legitimacy, contact the sender via a separate means of communication, such as by phone, before taking any action. Navigate directly to legitimate websites and verify websites prior to providing sensitive information. Keep systems up to date and implement security controls that help prevent account compromise, including establishing strong  passwords, enabling multi-factor authentication (MFA) where available, and choosing authentication apps or hardware tokens over SMS text-based codes. Also, refrain from posting sensitive information online to reduce your  digital footprint . Users who suspect their PII has been compromised should review the Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources, including credit freezes and enabling MFA on accounts. These types of scams may be reported to the Federal Trade Commission, FBI’s  Internet Crime Complaint Center, and the NJCCIC.

 

Beware of Scams Capitalizing on Public Interest
Cybercriminals often leverage public interest and current events to conduct financial fraud and disseminate malware. These attacks may be initiated by social engineering tactics, such as phishing, SMiShing, or vishing. On August 24, the Student Loan Debt Relief Plan (2022 SDRP) was announced and has already garnered significant attention from the public. The FBI warns that cybercriminals may target individuals seeking to enroll in the federal student aid program with phishing emails, fraudulent websites, texts, or phone scams using student loan relief as a lure. Emails may use display name spoofing to appear as a known or trusted entity and attempt to convince the potential victim to click a link or open an attachment with intentions of stealing sensitive information, user credentials, or installing malware. There is never any cost to apply for the federal student aid program through the Department of Education or its trusted partners.
Additionally, recent reporting indicates that cybercriminals are attempting to steal relief funds by capitalizing on Hurricane Ian recovery efforts. Analysts discovered attempts to file fraudulent claims or exploit generous donors by sending phishing emails and social media posts containing URL links to cloned or fake charity websites used to harvest user credentials and financial data.
The NJCCIC recommends all users educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from clicking links, opening attachments, providing monetary funds, or sharing sensitive information with any unverified channels. Additionally, users are encouraged to navigate directly to URLs and verify the legitimacy of any charity they would like to donate to. Further information regarding debt cancellation, eligibility, and other specifics of the 2022 SDRP program can be found on the Federal Student Aid website. Additional resources to verify charities can be found in the Federal Trade Commission’s Before Giving to a Charity article, CharityWatch.org, and the Federal Emergency Management Agency’s Volunteer and Donate webpage.

 

Stay Cyber Safe This Holiday Season
During the 2021 holiday season, consumers spent approximately $886.7 billion, an increase of over 14 percent from the previous year. On Cyber Monday 2021 alone, consumers spent  approximately $10.7 billion. This year, total sales are expected to moderately increase given the rising costs of goods and services due to inflation and other factors, and consumers may choose to spread out their holiday shopping over a longer period of time. While predictions  for total sales are debated, one thing is certain - cybercriminals will continue their efforts to target online shoppers and marketplaces for financial gain. As consumers may be increasingly motivated to find deals, specials, and discounts when purchasing gifts this year in particular, it is vital to maintain awareness of the many cyber threats posed by these individuals and groups. Threat actors may target victims through a variety of methods, including compromised or spoofed websites, phishing campaigns, social media ads and messages, or unsecured Wi-Fi networks. Reviewing the common attack vectors detailed in this article, along with tips and best practices, will help to combat the threats posed by cybercriminals this holiday season. Continue reading…

 

Fraudulent PayPal Order Confirmation Phishing Emails
The NJCCIC observed emails sent to New Jersey State employees impersonating PayPal. These emails claim that an order for a product – often a smartphone – made through PayPal has shipped. The email includes supposed transaction information, often in the hundreds of dollars, and informs the recipient to call the provided number if they did not authorize the purchase in order to report and block the transaction. If called, however, the recipient may be prompted to provide personal or financial information, PayPal account credentials, or access to the user’s device. These can be used by threat actors to compromise accounts, steal funds, access user device information including passwords, and conduct subsequent malicious activity. While this campaign did not employ display name spoofing to appear as though the sending address is from PayPal, other campaigns may include these tactics. These emails may be more likely to bypass email security tools and be delivered to a user's inbox as they do not contain malicious attachments or links.
The NJCCIC advises against calling numbers provided via email and instead, research the company’s official phone number to verify account information; never disclose account passwords; verify transaction information via official websites or apps; and dispute charges using official channels. Users who receive this or similar emails are advised not to respond and to report the communication to the FBI’s IC3 and the NJCCIC. Additionally, maintain awareness of these and other common social engineering tactics to lower the risk of victimization.

 

Google Translate Phishing Campaigns
Consistent with open-source reporting , the NJCCIC observed multiple Google Translate phishing campaigns targeting New Jersey State employees in an attempt to steal users' account login credentials. Threat actors create spoofed emails to make fraudulent emails appear legitimate and from a trusted source. In the example above, the subject line includes the target’s email address followed by “Message Failure Delivery Notice!” to create a sense of urgency that may result in a user taking action. The emails contain links that include a string of random characters followed by “translate.goog.” This creates the impression that the website is not in the English language, will be translated through Google Translate, and the link bypasses security controls because the URL is viewed as a legitimate Google domain. The link, if clicked, ultimately directs targets to spoofed websites translated by Google Translate to ultimately steal user credentials.  
In another example, the above campaign is capable of stealing users’ credentials, creating backdoors for remote access, logging keystrokes, and deploying ransomware. The subject line includes “You,” the target’s email address, followed by “received a share document via Onedrive!” It purportedly shares a document via OneDrive, which OneDrive is misspelled, and tries to convince the target to take action to view the document. The emails also contain links with a string of random characters followed by “translate goog.”
Another campaign uses social engineering to steal credentials and other information, log keystrokes, deploy ransomware, and exfiltrate data. The subject line contains “Warning: Mail Quota Exceeded (97% Full) UPDATE” to create a sense of urgency to update storage. Other subject lines in this campaign include the target’s email address followed by Password reset !!!” or “Password update – FINAL NOTICE!”. The emails also contain links with a string of random characters followed by “translate goog.”
The NJCCIC recommends all users educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from opening attachments or clicking links delivered in suspicious or unexpected communications, even those from known senders. If unsure of the legitimacy of the message, contact the sender via a separate means of communication, such as by phone or in person, before taking any action. Additionally, navigate directly to official and legitimate websites and only submit account credentials to official websites. Users whose accounts have been compromised are advised to immediately change their password, as well as for any other account that uses the same password. Users are encouraged to enable any form of multi-factor authentication (MFA) offered while choosing a more secure method (authentication app, biometric, or hardware token) where available.
Online Banking Phishing Campaigns
Image 1: Capital One Phishing Email
The NJCCIC observed multiple phishing campaigns targeting New Jersey State employees attempting to steal users’ online banking credentials. In one campaign, threat actors distributed emails using display name spoofing to impersonate Capital One and prompted users to verify their accounts (Image 1). The fraudulent email poses as a security alert, notifying the user that their Capital One account was logged into from an unknown location, and requests the victim to validate and update their account. The email contains links to the legitimate Capital One website to add legitimacy; however, the link to update the user’s account leads to a fraudulent website using stolen branding and displaying the login screen for Capital One. If account credentials are submitted, a login prompt is displayed, and the credentials are stolen in the background.
Image 2: Fraudulent American Express Verification Website
In another campaign, emails impersonating American Express request users to click on an embedded link to confirm their account information, stating that their account will be suspended if the information is not verified. The link leads to a website that requests several data points from the user, including bank card information, email address and password, Social Security number, bank PIN, date of birth, mother’s maiden name, and place of birth (Image 2). There is very limited text box input validation, which allows users to enter any characters into these fields and continue on through the “verification” process. After the user submits their information, they are redirected to the official American Express website while their information is sent to the threat actors behind the campaign.
Image 3: M&T Bank Phishing Email
Lastly, another phishing campaign distributed messages impersonated M&T Bank, using display name spoofing and a convincing sender email address. The subject line reads, “Your Immediate Action is Required on Your Account From M&T Bank.” The email body contains a reference to an “Important Notice,” prompting the user to click the link to navigate to the “Resolution Center” (Image 3). The link directs the user to a fraudulent website appearing as a login page for M&T Bank. If account credentials are submitted, they are stolen in the background while a login error is displayed to the user.
The NJCCIC advises against responding to or clicking links in unexpected emails from unverified senders. Users are encouraged to navigate directly to official websites to log in to their account and verify any requests to provide information or resolve issues. If a user submitted account credentials on a fraudulent website, they are advised to change their password, enable multi-factor authentication (MFA), and notify their banking institution. If information was submitted on a fraudulent website that could be used for identity theft purposes, review the Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources, consider freezing your credit , and file a police report. Additionally, phishing emails and other malicious cyber activity can be reported to the FBI’s IC3 and the NJCCIC.

 

SMiShing Texts Claim “Package Cannot Be Delivered”
Image 1. SMiShing text message
The NJCCIC observed SMiShing texts claiming that a package cannot be delivered due to incorrect address information. Smishing is a form of social engineering that exploits SMS text messages and may contain email addresses, phone numbers, or links to webpages. Threat actors often take advantage of current events and times of the year, such as the holiday season, to target potential victims. In the above example (Image 1), the threat actor attempts to entice the user to click on a link in order to address an issue with a package delivery, capitalizing on the busy holiday season.
When clicked, the link directs the user to a convincing webpage imitating the United States Postal Service (USPS) and requests personal information such as name, physical address, email address, and phone number (Image 2). The website, created on December 20 and registered with NameSilo, contains multiple processes and redirects, one of which appears to post collected information to a Chinese IP address (Image 3). These techniques are frequently used by various threat actors, and the URLs associated with these schemes often change.
Image 2. Malicious landing page impersonating USPS
Image 3. Source: Urlscan.io
The NJCCIC advises users to navigate directly to official websites and avoid clicking links delivered in SMS text messages from unknown contacts. Additionally, refrain from providing sensitive information to unverified websites. SMS text scams can be reported by forwarding the message to 7726 (SPAM). Further recommendations and resources can be found in the Don't Take the Bait! Phishing and Other Social Engineering Attacks NJCCIC informational report.

 

67K DraftKings Accounts Compromised in Credential Stuffing Attack
Sports betting company DraftKings released a data breach notification last week alerting customers that over 67,000 customer account records were exposed due to a credential stuffing attack. A cyberattack discovered on November 18 caused the breach, resulting in the theft of over $300,000 from DraftKings users. Credential stuffing attacks occur when cybercriminals obtain information such as usernames and passwords and use the credentials in attempts to log in to different types of accounts. For this reason, this attack is effective against users who use similar passwords on multiple platforms.
The NJCCIC received reports of breached DraftKings accounts based in New Jersey due to compromised credentials assessed to have been acquired from a depreciated DraftKings server and sold on the dark web. Compromised accounts were confirmed to have been sold on the dark web for $10 to $35 per account along with instructions on how to obtain money from the victim. Affected accounts were identified after cybercriminals placed $5 deposits into the compromised accounts, changed the account passwords, established multi-factor authentication (MFA) on a phone number controlled by the cybercriminal, and withdrew large sums of money from the victims’ connected bank accounts. In response to this cyberattack, DraftKings conducted an internal investigation, required affected customers to change their passwords, locked down breached accounts, implemented fraud alerts, and restored any funds confirmed to be lost due to the cyberattack.
In an abundance of caution, the NJCCIC recommends that DraftKings customers reset their passwords and enable MFA on all  accounts where applicable. Additionally, users are urged to monitor their credit statements and report suspicious activity, as well as refrain from reusing passwords on multiple platforms to reduce the effectiveness of credential stuffing attacks.

 

New IcedID Campaign Distributes Malware Through Fake Zoom Installer
Phishing website used in this campaign – Source: Cyble
On January 5, Cyble Research & Intelligence Labs published its discovery of a phishing campaign targeting users of the Zoom application. In this campaign, threat actors created a convincing webpage, explorezoom[.]com, that resembles an official Zoom domain and distributes IcedID malware. The phishing page encourages users to download a file called ZoomInstallerFull.exe, which is presented as a legitimate Zoom installer. However, this file is a concealed version of the IcedID malware that also downloads the Zoom application to obfuscate the malicious nature of the installer. IcedID, also known as BokBot, is a trojan used to steal banking credentials and is commonly distributed to businesses through phishing emails containing malicious Microsoft Office file attachments. In addition, IcedID may act as a loader, with the ability to download additional malicious files. IcedID is not typically distributed through fake websites, making this phishing campaign an unusual method to spread this malware.
The NJCCIC advises users to only download software from the application’s official website or legitimate vendors and avoid pirated software from unofficial sources, such as Torrent and Warez websites. Additionally, users are urged to avoid opening suspicious links or email attachments without verifying the authenticity of the sender. More information and technical details can be found in the Cyble article.

 

Job Scams Likely to Increase
The NJCCIC assesses with high confidence that threat actors will use current events, including recent mass layoffs , in their social engineering schemes to target and exploit individuals seeking employment. The combination of job seekers announcing they are open to work through online platforms and employers increasingly depending on online forms of communication increases the attack surface. Threat actors are taking advantage of job seekers by impersonating legitimate employers and recruiters and requesting personal or financial information as part of the application process or job offer with the intent to steal personally identifiable information (PII) or monetary funds, potentially commit identity theft and fraud, and launch other cyberattacks. These job-related scams are also highlighted as part of Identity Theft Awareness Week, which runs from January 30 to February 3, and serves to provide tips on reducing the risk of victimization and recovering from identity theft.  Continue reading…
Real Estate Wire Transfer Scams
 
Earlier this month, the NJCCIC reported on an aggressive phishing campaign targeting several New Jersey State agencies that regularly communicate with law firms. Aside from law firms, other parties involved in real estate transactions—including agents, title agencies, and buyers—are still at risk of being targeted. Unlike generic phishing scams, business email compromise (BEC) phishing scams are a highly targeted form of  social engineering, often incorporating preliminary reconnaissance on potential victims and using various impersonation techniques to pose as someone the target should trust. The NJCCIC continues to receive reports of real estate scams, specifically wire transfer scams, impacting law firms and buyers. According to the FBI’s 2022 Business Email Compromise and Real Estate Wire Fraud report , the Internet Crime Complaint Center (IC3) received BEC-related complaints with claimed losses exceeding $2.4 billion in 2021 compared to $360 million in 2016. Threat actors are likely to change tactics and increase their targeting as spring approaches. Continue reading...

 

SIM Swapping Attacks
A Subscriber Identity Module (SIM) card is a physical, removable smart card that contains subscriber identification data and authenticates a subscriber on a mobile device to a specified wireless carrier network. SIM cards contain data, such as user identity, location, mobile phone number, network authorization data, personal security keys, contact lists, and stored text messages. They also provide indirect access to the subscriber’s accounts, such as wireless carrier, email, social media, financial banks, and digital payment systems. For account security, subscribers typically set up phone calls or SMS text messaging as a second factor for multi-factor authentication (MFA) to log into accounts, recover account passwords, and receive account notifications for changes and updates. An embedded SIM (eSIM) card has similar functionality and security protections as a SIM card; however, eSIM cards are not removable and must be programmed. Also, for eSIM card-supported devices and wireless carriers, subscribers can easily switch between multiple mobile phone numbers using one mobile phone. We further discuss SIM swapping attacks, tactics, SIM swapping protections, and recommendations. Continue reading…
.
Tax Season Scams
Cybercriminals often take advantage of specific times of the year, and with tax season underway, threat actors are quick to launch social engineering campaigns conducted via email, phone, and SMS text messages. These social engineering attempts may impersonate legitimate tax services or the Internal Revenue Service (IRS) to trick recipients into disclosing sensitive information or credentials. Additionally, the NJCCIC received reports of tax preparation offices targeted by cybercriminals in attempts to compromise networks and siphon employee and customer information.
Threat actors often seek out tax information, including W-2 information and personally identifiable information (PII) – such as Social Security numbers (SSNs), dates of birth, bank account or credit card numbers, and drivers’ license numbers. With this information, threat actors can file fraudulent tax returns to collect refund money and engage in other identity theft schemes.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization and consider filing taxes early in the season to reduce the chances of threat actors filing fraudulent tax returns and stealing refunds. The IRS does not initiate contact with taxpayers by email, SMS text messages, or social media channels to send or request personal or financial information. Please review the Beware of Tax Scams  NJCCIC product to learn more about common tax scams—including tax identity theft, IRS impersonation scams, and fraudulent tax preparer scams—and cybersecurity best practices to help protect your identity, data, and tax refunds. Additional tax scams and consumer alerts can be found on the IRS website and the Norton blog post.

 

Vishing Scams
The NJCCIC recently received multiple reports of vishing schemes. In these calls, the scammer attempts to gain trust and legitimacy by sharing some of the recipient’s personal details; however, this information is typically a collection of aggregated publicly available details easily found online. This information may include first and last name, age, address, place of employment, education history, and family member information. Some of this information may be outdated or pertain to a partner instead of the call recipient. The scammer may then attempt to convince the recipient to provide additional personal details, purchase fraudulent goods or services, or grant access to their account or device. The phone numbers used in vishing campaigns vary and change frequently, and scammers often spoof official phone numbers to appear legitimate. Vishing calls may be persistent, and potential victims may be contacted multiple times a day.
One vishing report recently received by the NJCCIC detailed a campaign in which the caller claimed to be a Medicare representative. The following phone numbers and transcript were observed in this campaign:
  • 888-383-2017
  • 833-386-2609
  • 833-426-1857
  • 833-426-1866
  • 833-426-1775
  • 888-393-0766
“Hi there, gate. This is Glenda and I'm at Healthcare Health Center. Is this Robert? Is this Robert I'm speaking with? All right, perfect. Well, Robert, the reason why I'm calling is to provide your info, information, and options on your Medicare supplemental plan.”
The NJCCIC highly recommends users refrain from answering unexpected calls from unknown contacts. When receiving unsolicited phone calls, do not respond to any requests for sensitive information or access. If suspicious inquiries are made from individuals claiming to represent a trustworthy organization, hang up and call the organization back using the official phone number found on their website. The NJCCIC encourages those targeted by vishing scams to report the incident to the NJCCIC and the FBI's Internet Crime Complaint Center (IC3).

 

US probes reports of steering glitch on newer Honda Civics

..... U.S. Auto safety regulators are investigating complaints form Honda Civic drivers that the cars' steering can stick, causing a momentary increase in effort and increasing the risk of a crash.
..... The probe by the National Highway Traffic Safety Administration covers an estimated 238,000 Civic from the 2022 and 2023 model years.
..... The agency says it has 145 complaints about the problem, which happens mostly at highway speeds. The complaints came over the past 11 months and occurred mostly on vehicles with low miles.
..... NHTSA has no reports of crashes or injuries from the problem.
..... The company says most of the Civics should be under warranty, and that if any owner feel something is not right, they should contact their dealer.

CDC, FDA say General Mills four linked to salmonella outbreak

..... The Food and Drug Administration and Centers for disease Control & Prevention have linked Gold Medal Unbleached and Bleached All Purpose Flour with a multislate salmonella outbreak. The two agencies announced the finding Monday [05/01/2023] after the FDA found that five of nine cases in the outbreak had exposure to raw Gold Media flour. a sample taken at the General Mills plant in Kansas city, Missouri, was found to have the strain of salmonella affecting people in the outbreak, the FDA said.
..... General Mills issued a voluntary nationwide recall on April 28, [2023] of 2-. 5- and 10-pound bags of the flour with a "Better If Used By" dater of March 27, 2024, and March 28, 2023, according to the recall.

 

Job Scams Continue
Image Source: Trend Micro
The NJCCIC continues to observe social engineering schemes targeting individuals seeking employment, often referred to as job scams. Increases in layoffs and job cuts exacerbate this issue; layoffs in the financial sector alone increased roughly 419 percent in the first quarter of 2023 compared to the first quarter of 2022. Cybercriminals can more easily target individuals who declare they are seeking employment via social engineering platforms. Additionally, solely using online forms of communication throughout the hiring process makes it more difficult for individuals to identify red flags.
In these job scam schemes, cybercriminals target job seekers by creating and posting fraudulent job postings or profiles through trusted professional online employment boards and websites, such as LinkedIn, CareerBuilder, Indeed, and Monster, or via social media platforms like Facebook. Threat actors impersonate legitimate recruiters and employers, spoof company websites, and directly communicate with targets through email, social media, or SMS text messaging. Once contact is established with a job seeker, the cybercriminal will often request personal, account, and/or financial information as part of the application process with the intent to obtain personally identifiable information (PII), gain unauthorized account access, or steal monetary funds, which may potentially result in identity theft.
Examples  of job scams include work-from-home or remote work, nanny, caregiver, virtual personal assistant, mystery shopper, job placement service, and government or postal positions. In a recent incident reported to the NJCCIC, an individual was initially contacted via Facebook for a data entry job posting. The individual requested a Zoom call, but the hiring manager declined the call and requested that further communications and the interview be conducted via Telegram. During the Telegram call interview, the hiring manager requested the applicant's PII, including a photo of the front and back of the individual’s driver’s license, and then instructed them to open a Green Dot Visa card for direct deposits. At this point, the individual became aware that this could be a scam and ceased communications.
Red flags indicating a job opening or offer may be a scam include vagueness from the employer or hiring manager about the position; the job sounding “too good to be true”; upfront requests for personal and financial information, such as Social Security number, driver’s license number, or banking information for direct deposits; requests for money prior to receiving a job offer; a sense of urgency to respond or accept a job offer, and the use of unofficial communication methods, such as personal email accounts, noncompany email domains, and apps such as WhatsApp, Signal, or Telegram.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Job seekers are advised to examine potential offers by contacting the company’s human resources department directly via official contact information and research potential employers and businesses online to determine if others have reported a scam. Navigate to websites directly for authentic job postings by manually typing the URL into a browser instead of clicking on links delivered in communications to ensure the visited websites are legitimate. Additional information on job scams can be found on the Federal Trade Commission (FTC)  website.
If victimized, report the scam directly to the respective job board or organization, the FTC, and the NJCCIC. If PII compromise is suspected or detected, contact your local law enforcement department. Review the  Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources, including credit freezes and enabling multi-factor authentication (MFA) on accounts. 

 

Facebook Scams Continue to Compromise Accounts
Image Source: Facebook
The NJCCIC continues to receive reports of compromised social media accounts, including Facebook. Threat actors impersonate Facebook, target both individuals and organizations who have Facebook business pages, and use social engineering tactics through social media platforms and emails to send fraudulent messages or notifications in an attempt to deceive potential victims into clicking on phishing links or attachments, divulging sensitive information (such as account credentials, personally identifiable information (PII), or financial information), and/or installing malware to gain unauthorized access to the Facebook account. Examples of scams include false claims that the target violated Facebook’s Community Standards, warnings impacting the account if action is not taken, and notifications about friend requests, messages, events, photos, and videos. The communication purportedly creates a sense of legitimacy and urgency to convince the victim to divulge PII, financial information, and, in some cases, a copy of the driver’s license as proof of identity. Messages may also direct the target to log in with social media, email, or bank account credentials/ information.
Once an account is compromised, threat actors can change account information such as name, birthday, email address, and phone number and lock the victim out of their account by updating the password and multi-factor authentication method. They can also impersonate the victim, communicate with the contacts in the victim’s address book, and engage in further malicious activity, such as conducting social engineering attacks, sending harassing messages to contacts, posting information and/or images that violate the platform’s terms and conditions and/or acceptable use policies, and threatening extortion. Scams can also result in identity theft and financial loss.
In the above scam, threat actors impersonate Facebook and send notifications to Facebook business page administrators that their page has been disabled. The notification contains a link to view more details about the violation that, if clicked, directs the target to an interface with Facebook branding and prompts them to enter their account credentials and other personal information.
The latest Facebook scam plays on emotions and claims that someone they know just died. The threat actors identify themselves as a close friend or family member of the target and send them a message with phrases such as “look who just died,” “so sad,” or “I know you known him.” The message contains a link appearing to be a legitimate news article. If clicked, the target is prompted to enter their Facebook credentials to review further details. These credentials are sent to the threat actors in the background and used to compromise the account and send the same message to the victim’s friend list. Additionally, the threat actors can steal personal information—such as email addresses, phone numbers, and birthdates—to access non-Facebook accounts and may potentially access financial information to steal funds. In some cases, the malicious link installs malware on the victim’s computer to access passwords, photos, and files.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from responding to unsolicited communications and exercise caution with communications from known senders. If unsure of the legitimacy, contact the sender via a separate means of communication – such as by phone through official and legitimate sources – before taking action or disclosing sensitive information. Additionally, set up alerts, avoid password reuse, maintain unique passwords for each online account, and enable multi-factor authentication (MFA), choosing biometrics and authentication apps over SMS text-based codes where available. Furthermore, refrain from posting sensitive information and images online to reduce your digital footprint.
If victimized, report the scam directly to the respective social media platform, the FTC, and the NJCCIC. If PII compromise is suspected or detected, contact your local law enforcement department. Review the  Identity Theft and Compromised PII  NJCCIC Informational Report for additional recommendations and resources, including credit freezes and enabling MFA on accounts.
Announcements

 

Beware of Skimmers and Infostealers Targeting E-Commerce
A growing number of cyberattacks were discovered targeting retailers and online consumers as summer sales heat up. Though the holiday season remains the most profitable time for retailers, sale events are often launched in the slower summer months to increase revenue. Consumers often take advantage of these summer sale events including semi-annual sales; Independence, Memorial, and Labor Day sales; Father’s Day and graduation gifts; back-to-school sales, and Christmas in July sales.  Akamai researchers identified a new, large-scale, Magecart-style web skimming campaign, designed to steal personally identifiable information (PII) and credit card information from e-commerce websites. Distinct from traditional Magecart campaigns, however, this campaign uses new techniques to hijack legitimate commerce websites in order to serve as improvised command-and-control (C2) servers, using the host victim’s website to further facilitate malicious code distribution.
Cybercriminals use various evasion techniques during the campaign, masking the attack to resemble popular third-party services and allowing it to go undetected for over a month. This attack may potentially exploit known vulnerabilities found in websites’ digital commerce platforms such as Magento, WooCommerce, WordPress, and Shopify, or in vulnerable third-party services used by the website. These attacks cannot be detected by popular web security methods, such as web application firewalls (WAFs), and are executed on the client side, prolonging the attack. This may result in tens of thousands of victims and damage the reputations of victimized organizations. Additionally, consumers’ PII and credit card information are at risk of being stolen or further sold on dark web forums.
Threat actors are also targeting online sellers in a new phishing campaign to distribute Vidar information-stealing (infostealer) malware. They impersonate a customer of an online retailer claiming that they were charged a large dollar amount after an alleged order did not go through. These complaints are sent to online store administrators via email or website contact forms and contain a link to a fake Google Drive page that prompts the user to download a malware-laden PDF file. Threat actors target online sellers to steal admin credentials in order to gain access to eCommerce websites and facilitate further cyberattacks.
Infostealers are remote access trojans (RATs) designed to gather information from a system. Infostealers gather login information, like usernames and passwords, and are frequently used to further facilitate ransomware attacks. The NJCCIC and other cybersecurity firms have indicated a steady increase in attempts to distribute infostealers, such as Redline Stealer, Vidar, and Raccoon Stealer. Vidar is capable of stealing browser cookies, browser history, saved passwords, cryptocurrency wallets, text files, Authy 2FA databases, and capturing screenshots of the active Windows screen. Redline Stealer is a powerful data collection tool, capable of extracting login credentials from a wide range of sources, including web browsers, FTP clients, email applications, Steam, instant messaging clients, and VPNs. Raccoon Stealer steals personal information, including email addresses, identification numbers, bank account information, and cryptocurrency information. Cybercriminals can use this stolen information to commit identity theft, financial fraud, and other crimes.
The NJCCIC recommends online retail customers minimize their risk of data exposure by using electronic payment methods, virtual cards, or setting charge limits to their credit cards. Online customers are encouraged to use credit cards over debit cards when shopping online as they often have better consumer fraud protections. Additionally, many financial institutions offer payment charge notifications for every transaction that occurs on an account. Enabling these notifications may make it more likely that a customer will notice a fraudulent transaction as soon as it occurs and can notify their bank. If a customer discovers fraudulent activity on their account, lock the affected card if this option is available, notify the banking institution immediately, and request a new payment card.
Furthermore, we advise merchants to conduct thorough security due diligence reviews of third-party services and resources. To protect websites against Magecart attacks, website administrators are recommended to, by default, block access to sensitive information entered into web forms and stored cookies. Only vetted scripts developed in-house should have access to sensitive data. Security practitioners are advised to consider using tools and technologies that provide behavioral and anomaly detection of in-browser activity. In addition, establish good patch management, enable multi-factor authentication (MFA) on all administrative accounts at a minimum, and implement a WAF. Additional details can be found in the Akamai Security Report and the BleepingComputer article

 

Uptick in Direct Deposit Scams
The NJCCIC recently received multiple incident reports from organizations targeted with direct deposit scams in an attempt to change bank account information for direct deposit payments for payroll to facilitate fraud. Threat actors primarily target K-12 school districts; however, all organizations, regardless of sector, are at risk. In the above campaign, threat actors impersonate an employee, often by registering an email address using the employee’s name and utilizing display name spoofing in the email messages. The fraudulent emails are typically sent to payroll or human resources departments and request direct deposit change forms. In some cases, the threat actors locate an organization’s direct deposit change form online and include a filled-out form in the email. The threat actor intends to divert an employee’s payroll check to an account under their control. These emails may have noticeable red flags, such as spelling and grammatical errors; however, they may be well-crafted and more difficult to identify as suspicious.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from responding to unsolicited communications and exercise caution with communications from known senders. If unsure of the legitimacy, contact the sender via a separate means of communication – such as by phone through official and legitimate sources – before taking action, disclosing sensitive information, and/or transferring funds. All users are encouraged to maintain awareness of common red flags found in malicious email messages, such as display name spoofing tactics.
Additionally, we highly advise organizations to implement procedures to prevent unauthorized direct deposit changes, such as requiring two levels of approval and verbal agreement from the requesting employee.

 

 

Malicious JScript file. Image Source: Any.Run
The NJCCIC advises users to ignore and delete these phishing emails, report the activity to their IT department if applicable, and avoid releasing these types of correspondence to their inbox from a quarantined environment. Users are advised to refrain from responding to unsolicited communications, clicking links or opening attachments from unknown senders, and exercise caution with communications from known senders. If unsure of the legitimacy, contact the sender via a separate means of communication, such as by phone, before taking action. Phishing emails and other malicious cyber activity can be reported to the FBI's Internet Crime Complaint Center ( IC3) and the NJCCIC
Additionally, organizations are advised to implement filters at the email gateway to identify and block emails using known phishing tactics and those from suspicious IP addresses, create an email gateway rule to flag communications in which the “reply” email address is different from the “from” email address, and identify emails that originate outside their network by marking them with an “external email” tag in the subject and body since these emails should be given additional scrutiny. Furthermore, create a policy and procedure to identify and report business email compromise (BEC) scams, including periodic employee awareness training; establish policies and procedures that require any requests for highly sensitive information or large financial transactions be authorized and approved by multiple individuals via a secondary means of communication beyond email; and implement Domain-Based Message Authentication, Reporting, and Conformance (DMARC) to reduce the risk of email spoofing. Further information can be found in the SPF Technical Guide.

 

Gift Card Scam Lures
The NJCCIC observed multiple campaigns identified as gift card scams attempting to convince New Jersey State employees to purchase gift cards to extort funds. The emails are primarily from free email providers instead of corporate domains. Threat actors may spoof the sender’s display name, which may differ from the sender’s email address in the header information. Additionally, they may contain a reply-to address that is different than the sender’s email address. Subject lines contain keywords such as “touching base,” “favor,” and “check in,” and the fraudulent requests typically begin with a brief message inquiring if the potential victim is available. In the above campaign, threat actors request the recipient to let them know when they receive the email because they would like to ask them something. Similar campaigns may, for example, apologize for bothering the potential victim and inquire if they order from Amazon.
If the intended target replies, the scammer sends a request urging the potential victim to purchase gift cards and respond with the numbers found on the back of the cards. If submitted, the threat actors can use the gift card’s funds without the physical card since the funds are not linked to a specific person or entity. Additionally, victims typically will not be able to recover the funds used for purchasing the gift cards – even if the purchase was made by credit card – because the victim initiated the transaction, resulting in significant monetary losses.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from responding to unsolicited communications, clicking links or opening attachments from unknown senders, and exercise caution with communications from known senders. If unsure of the legitimacy, contact the sender via a separate means of communication, such as by phone, before taking action. We remind users to refrain from complying with requests to purchase gift cards and sending the numbers to someone without first verifying the request via a separate means of communication. These are unusual requests or demands, typically portraying a sense of urgency, and should be handled with increased suspicion.
If gift card information is sent, immediately contact the company who issued the gift card to inquire if the funds are still on the gift card and can be frozen. We encourage users to report cyber incidents via the NJCCIC Cyber Incident Report Form, the FTC Complaint website, and the FBI’s IC3  website . Additionally, users who send unsolicited emails or messages through online platforms may violate account policies and terms of use and should be reported to the sender’s email provider or associated online platform. Additional information can be found in the FTC resource.

 

 

QR Code Phishing Campaigns

The NJCCIC recently observed two phishing campaigns in which threat actors included suspicious links via QR codes. Quick Response (QR) codes are square barcodes that can be scanned by smartphones to quickly send users to a website, download an application, or direct payments. The use of QR codes increased during the COVID-19 pandemic as restaurants and other businesses transitioned to using online menus and resources to decrease the likelihood of patrons spreading germs via hard copies. The popularity of QR codes remains, and with it comes the adoption by cyber threat actors to deliver malicious links to their targets. These recently reported phishing campaigns included emails impersonating IT departments and used lures of updates to, or maintenance of, 2FA (two-factor authentication, also known as multi-factor authentication). While one campaign inserted the QR code directly in the body of the email, another included a PDF attachment where the QR code was provided. Separately, the Better Business Bureau (BBB) recently reported on a QR code fraud scheme in which scammers placed fake QR code stickers on top of legitimate ones in order to send drivers to fraudulent sites to pay for parking. In January 2022, the FBI released a Public Service Announcement, Cybercriminals Tampering with QR Codes to Steal Victim Funds, which provides tips to protect yourself from these scams.
The NJCCIC advises users to avoid scanning QR codes included in emails, even those that appear to be sent from known or trusted contacts, without first verifying the legitimacy of the communication. Additionally, follow the recommendations found in the BBB and FBI reports to avoid falling victim to a QR code scam, including looking for signs of tampering and reviewing the associated URL before navigating to the website. Users are encouraged to educate themselves and others on this and similar scams to prevent future victimization.

 

Utility Company Impersonation Scams
Many business and residential utility customers are targeted daily by impersonation scams. For example, threat actors take advantage of extreme weather events, such as the recent increases in temperature, to target electric utility customers. Threat actors impersonate the utility company through in-person, phone, and online tactics, claim the utility bill is past due, and threaten to disconnect services unless a payment is made immediately. Customers are pressured to make payments via prepaid debit cards (such as Green Dot, MoneyPak, or Vanilla), wire transfers, cash apps (such as Venmo or Zelle), gift cards, or cryptocurrency (such as Bitcoin). However, legitimate utility companies typically accept a check or credit card payment. Additionally, threat actors may claim that the regular payment portal for the utility company is currently offline, but the target can submit payment through another portal via a link or QR code. This fraudulent payment portal creates a false sense of legitimacy by using spoofed domains, impersonation, and stolen branding.
Scammers may visit the target’s home or place of business in person, claim to be a utility company collector, present fraudulent identification, and ask for personal information, including account number or Social Security number. However, legitimate employees wear a uniform, visibly display a company ID badge, drive a company car with the utility company's logo, and visit during a pre-scheduled appointment with the customer. Additionally, if customers receive an urgent call from their utility company's trusted customer service number claiming termination of services for non-payment and that someone will arrive in 15 minutes to disconnect service, slow down the conversation before making any quick decisions and verify the information through official sources, as the phone number may be spoofed. Also, threat actors are targeting customers who use search engines to contact their utility companies. The search engine results may contain fraudulent websites with fake phone numbers that, if called, will put unsuspecting customers at risk for threat actors to collect personal and financial information. Furthermore, service disconnections are not immediate; there is a multi-step process, including payment arrangement options and multiple notifications to the customer, typically by mail and noted on their regular monthly bill.
Online tactics of phishing and SMiShing attempt to convince the target to immediately take action, such as responding or calling a fraudulent phone number, disclosing sensitive information, or making payment. Traditional attack techniques of malicious links or attachments are often detected by email security, forcing threat actors to pivot to QR codes as the primary attack method in various schemes. QR codes, sent through unsolicited communications or posted in publicly accessible locations, may appear to be associated with a reputable brand or organization and could direct targets to phishing websites, fraudulent payment portals, and unsuspecting malware downloads. In one campaign, the threat actors persuade their victims to withdraw money from their financial accounts and transfer it to them using a QR code and cryptocurrency ATM to avoid service disconnection. Once the funds are deposited into the ATM to purchase cryptocurrency, the QR code with the embedded address is scanned, and the money is transferred to the threat actors.
The NJCCIC recommends users remain vigilant of these and similar impersonation scams. We advise users to refrain from answering unsolicited or unexpected communications, especially those containing QR codes. Additionally, do not provide personal or financial information or transfer money, especially in cryptocurrency, to unverified entities. If suspicious, locate your utility bill or navigate directly to the utility company's official website or the New Jersey Board of Public Utilities Utility Contact Info webpage to contact the utility company and confirm the legitimacy of the communication. Users may also sign up and check their online customer accounts to receive helpful alerts and verify service status, including service disconnections. Additional information and recommendations can be found in the Impersonation Scams NJCCIC product and the Federal Trade Commission (FTC)’s Scammers Pretend to Be Your Utility Company article.

 

Scammers Are Banking On Consumers’ Interest in Pre-Black Friday Deals
Consumers are taking advantage of popular retailers’ early access and pre-Black Friday deals. According to the National Retail Federation (NRF), nearly half of consumers began holiday shopping before November last year. Similar trends are expected this year as a recent NRF survey revealed that 39 percent of shoppers plan to start shopping earlier than they typically do this holiday season. Retailers and consumers are both feeling the strain of inflation. As a result, more sales events are being held to accommodate and attract customers planning to spread out their holiday shopping to manage associated costs.
According to a study conducted by Barclays, nearly half of the surveyed consumers admitted feeling pressured to make purchases quickly during Black Friday sales to avoid missing out on the best deals. The study further revealed that 42 percent of the participants were willing to buy from unknown vendors for a great deal rather than shop from trustworthy websites.
Balsam Hill scam Facebook ad. Image Source: Trend Micro
Cybercriminals are very active during this time of year, taking advantage of consumers engaged in online shopping, anticipating package deliveries, and often overwhelmed with additional plans. Scammers may send out fake order confirmations, issue phony tracking numbers, and set up fake websites impersonating legitimate retailers or promoting nonexistent ones to victimize shoppers. Between October 1 and November 1 this year, Trend Micro identified 34,896 URLs related to Black Friday scams – 10 percent more than what was observed during the same period last year. Additionally, the Better Business Bureau (BBB) received complaints regarding fake holiday shopping advertisements and decoration purchases. For example, scammers were observed impersonating Balsam Hill , a legitimate company that sells Christmas decorations, using the company’s name and branding to create copycat versions of the real Balsam Hill website. These fake websites were promoted via shared social media advertisements.
As you prepare for the holidays, keep in mind these basic best practices:
  • Navigate to official websites and applications to make purchases, update information, or track a package’s status.
  • If a deal seems too good to be true, it probably is! Avoid navigating to websites via shared social media posts.
  • Check reputation and ratings prior to purchasing from an unknown retailer and verify the payments page is secure.
  • If you have accidentally revealed your online account or banking details, change your passwords immediately, enable multi-factor authentication (MFA), and inform your banking institution.
  • Additional information and recommendations regarding holiday scams can be found in the NJCCIC informational report, “Stay Cyber Safe This Holiday Season.”

 

Honda, BMW, Subaru among 528K cars recalled:

By: Zoe Wells
USA Today

..... The national Highway Traffic Safety Administration issued multiple recalls last week, [11/17/2023] nearly 250,000 Honda Vehicles for a manufacturing error in the connecting rod baring.
..... Are you looking to see if any recalls were issued on your vehicle? If the car isn't listed below, owners can check USA Today's automotive recall database or search the NHTSA's database fro new recalls. the NHTSA website allows you to search for recalls based on your vehicle identification number, or VIN.
..... Here are the vehicles recalls published by the NHTSA from November 11 to 18. [2023]

Honda recall:
Connecting rod bearing error

..... Honda is recalling 248,999 of its 2015-2000 Acra TLX, 2016-2020 Acura MDX, 2016-2019 Pilot, 2017 and 2019 Ridgeline, and 2018-2019 Odyssey error in the connecting rod bearing. The connecting rod bearing in the engine may wear and damage the engine. a damaged engine may cause it to stall, which increases the risk of a fire, crash, and injury, according to an NHTSA report.
..... Dealers will inspect and repair the engine as necessary, free of charge. Owner notification letters are anticipated to go out by January 2, 2024. Should owners require assistance, they can reach Honda customer service at 1-888-234-2138. the recall number are XG1 and GGO.

BMW Recall:
Camshaft timing bolts

..... BMW is recalling 155,627 vehicles because of camshaft timing bolts that can losses. The aluminum bolts on the vehicle that seal the housing for the variable camshaft timing adjustment (VANOS) may gradually loosen over time. If the VANOS that hold bolts loosen, it can increase the risk of injury and crash because the engine may stall, according to an NHTSA report.
..... Dealers will offer complimentary replacement of the four VANOS bolts. Letters alerting owners will be sent out on December 12. [2023] a second letter will be sent out when the solution is figure out. Owners can get in contact with BMW customer service at 1-800-525-7417.
Recalled vehicles:
* 2010-2012 BMW I Series
* 2010-2012 BMW 3 Series
* 2010-2011 BMW 5 Series
* 2010-2011 BMW X3
* 2010-2011 BMW Z4

Subaru Recall: Rear-view image

..... Subaru is recalling 95,830 of its 2021 Crosstrek, 2022 Forester and 2021-2023 Legacy and Outback vehicles because of review image problems. A defective weld might make some water pour into the inhibitor switch, which can cause it to malfunction. an inhibitor switch that is not functional can result in the failure of reverse lights to illuminate the rearview camera image to display, raising the likelihood of a collision, according to an NHTSA report.
..... Dealers will replace the inhibitor switch at no change. Notification letters will be sent out January 8, 2024.
..... Owners can reach Subaru at 1-800-782-2783. the recall number is WRQ-23.

Beware of Card Skimming This Holiday Shopping Season
The number of reported card skimming incidents increased 20 percent during the first half of 2023 compared to the same period in 2022. More specifically, New Jersey is one of several states with the most significant increases in skimming incidents, with at least a 50 percent year-over-year increase in incidents occurring during the first half of 2023. Based on this trend, the upcoming holiday shopping season means increased card skimming opportunities for threat actors to capture and steal customer data and financial information through various digital and physical realms, such as stores, restaurants, gas stations, and ATMs. Threat actors continue to seek out better methods to conceal their attacks and evade various security measures. This stolen data has severe consequences for consumers and businesses, including loss in revenue, legal damages, compliance issues, cross-site contamination, identity theft, fraud, and subsequent malicious activity.
Magecart attacks are a type of web-based data skimming operation used to capture customer payment card data from the checkout pages of online stores. These attacks are accomplished by gaining access to the targeted website (either directly or through a supply chain attack), injecting malicious JavaScript code into the checkout page to skim the desired data, and sending the information back to a threat actor-controlled server. Once payment card data is stolen, it can be used by the threat actors to make fraudulent purchases or sell on dark web or other marketplaces. These attacks continue to be prevalent, with a new campaign observed abusing 404 error pages and targeting many large organizations in the retail and food industries. Manipulating the website’s default 404 error page to hide malicious code is one of the more advanced obfuscation techniques seen before and creates challenges for detection and mitigation. Similar to the recent uptick in Magecart attacks, the Kritec campaign is ramping up its activity in time for the holiday shopping season based on the number of newly registered domain names attributed to the threat actor. In this skimming campaign, threat actors create compelling customized templates in local languages that make detection difficult.
Card skimming is not just limited to online transactions. Threat actors can discretely install small card-reading devices in point-of-sale (POS) terminals to steal card information. These devices can be installed at stores, restaurants, and gas stations. This past year, the Walmart retailer has been a frequent target of card skimming at 16 different US locations. Also, skimming devices were found on two gas pumps at a Delaware BP gas station. Threat actors are also targeting ATMs and shifting in terminal types and locations of card compromises. Non-bank ATMs at convenience stores and gas stations are becoming more prevalent than bank ATMs. In September 2023, skimming devices were discovered at an ATM inside a Wawa convenience store in Cinnaminson, NJ and may have been installed for two months prior to its discovery.
The NJCCIC recommends organizations and users educate themselves and others on these continuing threats and tactics to reduce victimization. Website administrators are urged to use only vetted first-party code, ensure hardware and software are up to date, use a web application firewall (WAF) to block and alert for potential code injection attacks, block unauthorized transmission of personal data by implementing a Content Security Policy (CSP), and schedule routine website scans to identify changes in JavaScript code composition.
The NJCCIC recommends using credit cards over debit cards for purchases, as credit cards often have greater consumer protections that limit a victim’s liability if fraudulent purchases are made. Navigate directly to known, secure, and encrypted websites and designate/monitor one credit card for purchases, if possible. We highly encourage enabling multi-factor authentication (MFA) on every account that offers it, including any online shopping websites.
Before you use a POS device or ATM, check to see if the machine has been tampered with. Refrain from using a machine that looks damaged or loose—you can also tug around the keyboard to scan for an overlay. When you do use the machine, cover your pin as you enter it so an overhead camera cannot record you. Additionally, keep an eye on your card at all times (if possible), retain receipts, monitor account statements carefully, and notify the financial institution immediately of any discovered discrepancies. Furthermore, many financial institutions offer payment charge notifications for every transaction on an account. Enabling these notifications may make it more likely that a customer will notice a fraudulent transaction as soon as it occurs and can notify their bank.
If victimized, lock the affected card if this option is available, notify the financial institution immediately, and request a new payment card. Also, review the Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources, including credit freezes and enabling MFA on accounts.

 

US probing engine fires in Toyota RAVE SUVs:
..... The U.S. government is investigating complaints of engine compartment fires in Toyota RAV 4 small SUVs. the investigation could affect nearly 1.9 million vehicles.
..... The National Highway Traffic Safety Administration began investigating after getting 11 fire complaints involving the 2013 through 2018 model years.
..... In documents posted Monday, [03/01/2021] the agency says fires start on the left side of the engine compartment. A terminal on the 12-volt battery may short to the frame, causing loss of electrical power, engine stalling or a fire.

IMPORTANT: Barnes & Noble says shopper info may have been taken in hack:
..... Barnes & Noble said the personal information of its shoppers may have been stolen after its computer systems were hacked.
..... The bookseller told customers in an e-mail Wednesday [10/14/2020] that hackers could have had access to their e-mail address, name, phone number, home address and a list of books or other products they have purchased.
..... The company said hackers didn't access credit card numbers and other payment information because it was encrypted.
..... Barnes & Noble said it learned of the hack on October 10. [2020]
..... Barns & Noble declined to say how many customers may have been affected by the hack.

IMPORTANT: US investigates fire reports in Chevy Bolt electric vehicles:
..... The U.S. government's road safety agency is investigating complaints that the Chevrolet Bolt electric vehicle can catch fire.
..... The probe by the National Highway Traffic Safety Administration covers nearly 78,000 Bolts made by General Motors from the 2017 through 202 model years.
..... The agency says in documents posted on its website Tuesday [10/13/2020] that it has three reports of fires that began under the rear seat while the cars were parked and unattended.
..... One person suffered smoke inhalation.
.... The fire damage appeared to be concentrated in the battery compartment area, spreading into the passenger area.
.... GM says it's cooperating with the probe and conducting its own investigation.
..... "The safety of our products is the highest priority for the entire GM team," the statement said. the company would not comment when asked whether the vehicles should be parked outside until the cause of the fires is determined.

IMPORTANT: US probes Mercedes vans for possible unwanted acceleration:
..... U. S. Auto Safety regulators are investigating speed sensor problems with Mercedes-Benz Sprinter full-size vans that could cause unwanted acceleration.
..... The probe by the National Highway Traffic Safety Administration covers about 160,000 Sprinter 2500 and 3500 vans from the 2011 through 2018 model years.
..... The agency says it has 44 complaints of rear wheel speed sensor problems that caused large fluctuations in speed and erratic transmission shifting.

IMPORTANT: Carnival Corporation hacked: guest and worker information accessed:
..... Carnival Corporation says it was the victim of a ransomware attack that likely got some personal information about the cruise company's guests and employees.
..... The attack was first detected Saturday. [08/15/2020] The attack accessed an encrypted portion of technology systems for one of the cruise line's brands and certain data files were downloaded, the company said in a filing with the U.S. Securities and Exchange Commission.
..... Carnival operates Carnival Cruise Line, Princess Cruises. Holland America Lines and other lines.

Announcement
The OVC Release Fraud Alert:
Scammers Target Senior Citizens, Claim to be DOJ

..... The Office of Justice Programs' Office for Victims of Crime (OVC) released a fraud alert after receiving reports regarding a pishing (voice-phishing) scam in which individuals claiming to represent the Department of Justice (DOJ) are contacting private citizens in order to obtain user's personal information. The scam appears to primarily target senior citizens. Those who receive these or similar calls are urged to avoid providing any personal or financial information and to report these scams to the Federal Trade Commission (FTC) via their website or by calling 877-FTC_HELP (877-382-4357). Fraud can also be reported to the FBI for law enforcement action at www.justice.gov/criminal-fraud/report-fraud . The National elder Fraud Hotline is a resource created by OVC for people to report fraud against anyone age 60 or older. Reporting certain financial losses due to fraud as soon as possible, and within the first 2 to 3 days, can increase the likelihood of recovering losses. For more information about the hotline, please visit stopeldeerfraud.ovc.opj.gov

Data of 10.6 Million MGM Reports Guests
Has Been Discovered on a Hacker forum

WHAT HAPPEN?
..... Data Security researchers discovered an online database containing the personal information of 10.6 million MGM Reports guests, including celebrities, reporters, government officials, and tech company executives, on a hacker forum. The database is reportedly from a security incident that occurred last summer [2019] in which data was obtained through unauthorized access to a cloud server.

Breached data include:
* Full names
* Dates of birth
* Home addresses
* Phone Numbers
* E-mail addresses

..... MGM reportedly contacted affected guests when the incident was discovered last summer, [2019] however the data has now appeared on well-known hacking forums. MGM has said that the exposed information was old and believes that the breached data is from guest stays from 2017 and earlier. While no payment information or passwords are part of the exposed data, the personal information could be used in phishing attacks, password resets, and other nefarious activities.

Honda hit by cyberattack:
..... Japanese carmaker Honda said Tuesday [06/09/2020] it was hit by a cyberattack that disrupted its business in several countries, though it expects the impact to be contained.
..... The company said there was no breach of data, but that it is working to "minimize the impact and to restore full functionally of production, sales and development activities."
..... "At this point, we see minimal business impact," the company said.
..... Production in Japan is back to normal. after being disrupted Monday [06/08/2020 morning and it is also expected to resume Tuesday [06/09/2020] in North America.
..... Production at Honda's U.K. factory in Swindon has been suspended during the COVID-19 lockdown and the attack is not expected to significantly alter tis plans to resume operations this week.

Healthcare and Public Health Sector Threat Analysis Report
Due to the recent wave of ransomware attacks impacting hospitals and medical centers in New Jersey and around the United States, the NJCCIC updated its Healthcare and Public Health Sector Threat Analysis Report, which includes information on the sector’s cyber risks, cybersecurity considerations, and recommendations.
The NJCCIC assesses with high confidence that the cyber threat and overall risk to the Healthcare and Public Health Sector is high and increasing.
Many critical infrastructure sectors have been increasingly targeted by disruptive cyberattacks as bad actors find new ways to use and monetize data. One such sector affected by the rise in cyberattacks is the Healthcare and Public Health (HPH) Sector. The attack surface of the HPH Sector is large and includes medical devices and software and patient records, including Protected Health Information (PHI). 
Due to legacy systems and irregular software updates, medical devices remain a viable vector of approach for cybercriminal operations. Historically, healthcare institutions have been perceived as having weak cybersecurity controls, making them desirable targets for threat actors. Unpatched and end-of-life (EOL) operational technology systems and Internet of Things devices, such as office automation equipment, printers, VoIP phones, and networking devices, may be used as initial access points into vulnerable networks or for lateral movement and pivoting. Exploitation of vulnerable medical devices, such as intravenous pumps and ventilators, can adversely impact healthcare facilities’ operational functions, patient safety, data confidentiality, and data integrity.  Because this attack vector remains a potential access point and has yet to be exploited, this writing will focus on the theft and exploitation of PHI.  However, it is important to address vulnerabilities found within medical devices to avoid potentially catastrophic outcomes for patients relying upon these life-enabling devices. Continue reading . . .

 

Breach Notification
ZeroedIn Technologies LLC
ZeroedIn Technologies, a data analytics company providing services to clients including Family Dollar and Dollar Tree, disclosed a data breach on November 27. Personally identifiable information (PII) for nearly 2 million people was exposed after hackers gained unauthorized access to systems, and reports indicate that New Jersey residents are among those impacted. While the company determined which systems were affected during the breach, they were unable to confirm which specific files were accessed. Affected systems contained sensitive information, including full names, Social Security numbers, and dates of birth. ZeroedIn Technologies will provide impacted individuals with guidance on protecting themselves against identity theft and fraud and offer 12 months of credit monitoring and fraud assistance services at no cost.
Beware of Gift Card Scams
It is commonplace for consumers to purchase gift cards as a present, especially for special occasions or the holidays. Threat actors seek to exploit this common task in gift card scams. For example, threat actors initiate fraudulent requests by spoofing a known or trusted person—such as a person in leadership or a position of authority within an organization, a friend, or a loved one—to make the request appear more legitimate. They also create a sense of urgency with a fake story or emergency to convince the recipient to act quickly without verifying. These fraudulent requests may be sent through email, SMS text messages, and social media platforms.
The NJCCIC continues to receive reports of gift card scams from New Jersey citizens and organizations. For example, an employee received an email sent from an external account purportedly from the CEO, who was attending a meeting out of state. The CEO requested their phone number to perform a task. The employee provided their phone number and then communicated through SMS text messages. The request was to purchase two $500 Apple gift cards, to which the victim complied and submitted the back of the gift cards. The request was identified as a scam when the victim was asked for the remaining balances. Continue reading . . .

 

Mobile Device Risks
According to the Verizon 2023 Mobile Security Index white paper, the number of diverse endpoints is increasing, especially those that are mobile or using mobile connectivity. Mobile devices offer users convenience, connection, control, and content, both personally and professionally. However, they transmit and store data and could be exploited by threat actors to compromise networks, devices, or accounts. Unpatched vulnerabilities in mobile devices increase the risk of compromised devices and cyberattacks. Additionally, mobile devices routinely connected to a home network can have further implications when subsequently connected to corporate networks and may introduce additional vulnerabilities and risks. Therefore, it is vital for users to employ cybersecurity best practices and ensure mobile devices currently in use are properly protected and secured.
The Open Web Application Security Project (OWASP) raises software security awareness and provides quality information regarding risks and vulnerabilities. OWASP posted an initial release of the top 10 mobile risks of 2023, including inadequate supply chain security, insecure authentication/authorization, insecure communication, inadequate privacy controls, and security misconfiguration. These risks are evident in the recent vulnerabilities highlighted below.
Security researchers discovered a credential-stealing vulnerability, dubbed AutoSpill, in the autofill functionality of Android mobile password manager apps. This vulnerability is a concern when both Android calls a login page via WebView and a password manager is used. Affected password managers include 1Password, LastPass, Enpass, Keeper, and Keepass2Android. DashLane and Google Smart Lock are also affected if the credentials are shared via a JavaScript injection method. This vulnerability does not require phishing or malicious in-app code.
Additionally, vulnerabilities in Qualcomm and MediaTek 5G modems, collectively dubbed 5Ghoul, impact many 5G Android and Apple smartphone models, routers, and USB modems. Threat actors do not need the target’s SIM card, as the attack can occur before the NAS authentication step. Therefore, they can impersonate a legitimate 5G base station using known Cell Tower connection parameters and cause temporary service disruptions and network downgrades to the 4G domain, potentially introducing more vulnerabilities. These vulnerabilities highlight the implications for mission-critical environments dependent on cellular service.
Furthermore, a Bluetooth authentication bypass vulnerability, CVE-2023-45866, was discovered in the Bluetooth protocol. Threat actors trick Bluetooth devices into pairing with a fake keyboard to connect to Android, Apple, and Linux devices without user confirmation. They can then inject keystrokes to install apps, run malicious code, and more.
Zero-day exploits pose a significant security risk as threat actors take advantage of vulnerabilities in software or apps that may be unknown to the vendor. Threat actors exploit these vulnerabilities before the vendor can release security patches or updates. Zero-day exploits may bypass device security measures, potentially resulting in data theft and exfiltration or the installation of malware.
Threat actors may also employ zero-click attacks, which do not require user interaction, such as opening malicious attachments or links. Instead, zero-click attacks rely on unpatched vulnerabilities in messaging, SMS text messaging, or email apps. These apps allow threat actors to hide manipulated data in text or images to exploit vulnerabilities and execute malicious code without user knowledge.
A critical concern of unpatched vulnerabilities is data leakage, which refers to the unauthorized transmission of sensitive data from an organization to an external recipient. It is typically due to unencrypted connections, weak mobile security settings, or when apps have excessive permissions that permit access and share user data without consent. Data leakage exposes personal or corporate data, which leads to privacy breaches and regulatory implications.
The NJCCIC recommends users and organizations research reviews and assess the risks of using software, applications, and services. Review permissions and privacy policies, download applications from official trusted sources, and keep apps and devices up to date. Additionally, apply cybersecurity best practices and review the NJCCIC instructional guides and the National Cybersecurity Alliance webpage for configuring privacy and security settings. Please review the User Beware: Your Smartphone Is Tracking Your Every MoveMobile Device Security, and SIM Swapping Attacks NJCCIC products for additional information on the risks associated with using mobile devices and associated apps, including user tracking, information exposure, and additional recommendations.
The NJCCIC further recommends reviewing and applying the recommendations in the How Big Is Your Footprint? NJCCIC Product to reduce your digital footprint and publicly-accessible information. Personally identifiable information may be accessed or stolen without your knowledge or permission and can be used to commit identity theft, fraud, cyberattacks, and other malicious activity.

 

Increase in State-Sponsored and State-Aligned Cyberattacks
Cyberattacks attributed to state-sponsored and state-aligned advanced persistent threats (APTs) continue to spike. Recent activity includes Russian threat groups APT 28 and APT 29. APT 28, also known as Fancy Bear and associated with Russia's General Staff Main Intelligence Directorate (GRU), was discovered leveraging a Microsoft Outlook zero-day identified as CVE-2023-23397 . These campaigns, first identified by Ukrainian cybersecurity analysts, primarily targeted the critical infrastructure of NATO countries and entities that provide an informational advantage in diplomatic, economic, and military affairs. APT 29, also known as Cozy Bear and associated with the Russian Foreign Intelligence Service (SVR), was recently observed extensively exploiting CVE-2023-42793, targeting servers hosting JetBrains TeamCity software.
In addition, there has been a notable increase and a change in tactics in cyberattacks launched by Chinese state-aligned threat groups. Nearly two dozen critical infrastructure organizations across the US, including an oil and gas pipeline and a Hawaii-based water utility, were compromised by APTs affiliated with the Chinese People’s Liberation Army (PLA) within the past 12 months. Notably, Volt Typhoon focuses on targets within the Indo-Pacific region, including Hawaii. CISA’s Executive Director, Brandon Wales, voiced concerns that China’s attempts to compromise US critical infrastructure may be, in part, to pre-position themselves to cause disruption or destruction in the event of a conflict to either prevent the US from projecting power into Asia or to cause misdirection and societal chaos inside the US which may impact decisive action if faced with multiple crises. FBI Director Christopher Wray also recently raised concerns regarding the current threat level, stating that he has “never seen a time where all the threats, or so many of the threats, are all elevated, all at exactly the same time.”
The NJCCIC strongly recommends organizations apply available updates immediately after appropriate testing. Additional mitigation measures include exercising vigilance, using strong passwords, and enabling multi-factor authentication (MFA). Further recommendations and technical details can be found in the Joint Cybersecurity Advisory and the National Cyber Security Centre (NCSC) advisory. 

 

Bank Impersonation Scams
Threat actors continue to research their targets, impersonate trusted entities, and initiate communications through email, phone calls, and SMS text messaging to convince them to take action, such as divulging information or transferring funds. In bank impersonation scams, threat actors seek personal information, account numbers, passwords, and PINs. If threat actors gain access to bank accounts, they can update personal and financial information. Additionally, they can set up fictitious travel notices or memos  to spend money outside the normal spending location and evade detection. Furthermore, threat actors will test accounts to see if they are being monitored. If threat actors perform a fraudulent transaction and the activity is not detected, they will perform additional transactions. Despite banks using Early Warning services to help fight bank fraud, bank impersonation scams are increasing. The Federal Trade Commission (FTC) revealed that bank impersonation was the top reported text message scam in 2022, and reports of this scam increased nearly twentyfold since 2019. The most popular choices of major banks used in impersonation scams included Bank of America, Wells Fargo, Chase, and Citibank.
The NJCCIC observed multiple emails sent to New Jersey State employees attempting to lure potential victims with urgent bank account notifications to capture login credentials. In the example above, the email conveys a sense of legitimacy by using stolen Bank of America branding. However, upon further inspection, the display name is spoofed with “Bank of America Alert,” while the sender’s email address of iolevron5886[@]live[.]com is from a Microsoft Live.com account and not from a Bank of America domain. The purported account verification notification warns of temporarily limited account access due to unauthorized login attempts or billing failures.
To regain account access, threat actors convince the target to click one of the highlighted links that, if clicked, directs users to a credential phishing website, hxxp://bank0famericaverifyandvalidatey0urinf0rmati0nsecurely0nlinej[.]wordpress[.]com. This malicious link is part of the WordPress domain, contains a Bank of America reference, and utilizes zeros in place of the letter “o.” Credentials entered on this page are sent to the threat actors in the background. 
Threat actors may also target victims in vishing campaigns by posing as bank employees, verifying personal and financial information, and claiming fraudulent activity has occurred on the account. In a recent vishing campaign, threat actors posed as a Wells Fargo Bank representative to verify that the target had opened a bank account and deposited a $1,000 check. When denied by the target, the threat actors further claimed that two pending Zelle payments were using this fraudulent account, and they could not stop the transactions. They advised the target to contact Zelle directly and provided a contact number, which was not verified by the target. The target spoke to the purported Zelle representative, who advised them that they could not cancel the transactions unless the target created a Zelle account. Once suspicions grew, the target contacted the real Wells Fargo fraud department through trusted sources. They were advised that this was indeed a scam since there was no record of a new account or pending transactions.
Image Source: WJLA-TV/Renee Roberson
Another bank impersonation scam involved threat actors making small, intentionally suspicious charges on stolen credit or debit card numbers, triggering a legitimate SMS text message from the target’s bank. To appear more legitimate, the threat actors immediately called the target, impersonating Bank of America and spoofing their phone number. They guided the target through steps to supposedly reverse the charges through their Zelle account. The threat actors convinced the target to perform tasks, such as opening the mobile banking app, creating a new contact, and naming the contact. The target was given a supposed claim number for the charge reversal, and they received a Zelle confirmation text message. However, the purported account number entered was actually a phone number, resulting in additional funds unintentionally being transferred to the threat actors.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. It is highly advised that users refrain from responding to unsolicited communications, clicking links, and opening attachments from unknown senders and exercise caution with communications from known senders. If you are unsure of the legitimacy, contact the sender via a separate means of communication – such as by telephone – obtained from trusted sources before taking any action. If correspondence contains requests for account changes or is otherwise suspicious, contact the bank directly before providing sensitive information or funds. Additionally, check accounts regularly, ensure multi-factor authentication (MFA) is enabled on accounts, and treat Zelle like cash payments, sending money to only people you know and trust. Report suspicious activity to the respective bank immediately and the FTC, FBI’s IC3, and the NJCCIC to limit proliferation.
.

 

Uptick in TOAD Campaigns
TOAD attack technique. Image source: Proofpoint
The NJCCIC detected a recent uptick in TOAD phishing campaigns that may cause substantial disruption and losses across various organizations. A telephone-oriented attack delivery (TOAD) attack uses various social engineering tactics to build trust and credibility with victims. The attack is perpetuated by threat actors leveraging a combination of business impersonation, phishing emails, and fraudulent call centers. The attacks rely on victims to call the cybercriminal directly using the phone number found in the phishing email. Successful attacks may result in credential theft, malware installation, loss of funds, and ransomware.
The messages used in observed TOAD attacks claim to originate from trusted organizations such as Norton, PayPal, McAfee, or other known companies and may include an attached invoice and details of a supposed bill or transaction fee for services. Once contact is initiated by the potential victim, the fraudulent customer service representative may attempt to obtain account credentials or convince victims to download a malicious program to “fix” a problem or provide remote access to their devices. These phishing emails may bypass email security due to limited indicators within the phishing email and the reliance upon the potential victim to initiate interaction to perpetuate the attack.
The NJCCIC advises against responding to unexpected emails from unverified senders. If a user receives this or similar messaging, contact the associated company by phone using the official phone number found on its website. The NJCCIC also reminds users that legitimate customer support will never request account credentials or unnecessary sensitive information over the phone. Users who have submitted account credentials on a fraudulent website or over the phone are advised to change their password and enable MFA . Additionally, phishing emails and other malicious cyber activity can be reported to the FBI’s IC3 and the NJCCIC. Additional information can be found in the Keepnet Labs blog post.
.

 

Securing All Your Shiny New Connected Devices
Many people receive connected or Internet of Things (IoT) devices as gifts during the holiday season. These devices may include gaming systems, smart TVs, tablets, home security systems, and internet-capable household items like doorbells, thermostats, and coffee makers. Smart devices have gained widespread popularity due to their convenience and accessibility. Users can control their connected appliances with ease using smartphone apps or websites. However, these devices also store and transmit data, which cyber threat actors could exploit to compromise networks, devices, or accounts. Compromised connected devices combined with vulnerable home routers increase the risk of cyberattacks. Devices routinely connected to a home network, such as a corporate network-connected computer, can fall victim to or introduce additional vulnerabilities and risks, resulting in further implications. Therefore, users must employ cybersecurity best practices for the new gadgets they receive this holiday season and ensure devices and networks are adequately secured. Continue reading…

 

Verizon Wireless Impersonation Scams
Over the past month, threat actors increased efforts to target Verizon Wireless cellphone subscribers with social engineering tactics, impersonating Verizon Wireless technical support and fraud agents using spoofed Verizon Wireless phone numbers and SMS text messages. For example, threat actors contact the target and claim that the account has been compromised with attempts to purchase phones. Since the account is supposedly on hold due to the account compromise and failed autopayment, they try to convince the target to make a payment through Zelle that, if paid, results in stolen personal information and funds.
In another campaign, the threat actors informed the target that someone had tried to purchase thousands of dollars worth of Verizon merchandise. They advised them to change their password, which gave the threat actors access to the account, including bank account information for autopay. They also claimed they must migrate the account to another platform and issue a charge. Once the target became suspicious, the threat actors threatened to lock their phones. They were successful; however, the real Verizon Wireless was able to reactivate the phones. In a similar campaign, threat actors claimed the target’s account was locked for security purposes and sent the target a temporary password. They further claim they must migrate the phone service to a new platform and that the account is suspended. The target was requested to resubmit two Zelle payments from their bank account to reinstate it, and the threat actors would transfer it immediately into the target’s account.
Threat actors may also claim there is suspicious activity on the account and that someone is trying to add two phone lines to the account. The threat actors advise the target that they need to transfer the phone lines to another platform and assign a new account number, and the target needs to make a payment in the exact amount of the last Verizon Wireless payment, which would be transferred back to the account. Additionally, they claim Verizon Wireless has a new policy of not utilizing or sharing bank or credit card information, instead advising the target to submit payment through Zelle.
In a separate campaign, threat actors notified the target that the account was flagged for suspicious activity as several iPhones were purchased and shipped to multiple addresses, including the home address on file. The threat actors confirmed the addresses and asked if the target made these purchases, who replied no. They claimed they could not stop the shipment because it had already left the warehouse, and the target would be charged for the phones unless returned. The target further replied no and requested to reroute the one package to the home address. The target then received an SMS text message with an authorization code, which was shared with the threat actors.
The NJCCIC assesses with high confidence that threat actors will continue to use social engineering tactics to gain unauthorized access to accounts and commit further malicious activity. The prevalence of data exposed via breaches and information publicly available online highlights the importance of staying vigilant to help prevent successful social engineering attempts, account compromises, identity theft, and fraudulent activity. 
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. It is highly advised that users refrain from responding to unsolicited communications, clicking links, and opening attachments from unknown senders and exercise caution with communications from known senders. If you are unsure of the legitimacy, contact the sender via a separate means of communication – such as by telephone – obtained from trusted sources before taking any action. If correspondence contains requests for account changes or is otherwise suspicious, contact the wireless carrier directly before providing sensitive information or funds. Additionally, check accounts regularly, ensure multi-factor authentication (MFA) is enabled on accounts, and treat Zelle and other peer-to-peer payment apps like cash payments, sending money to only people you know and trust. Report suspicious activity to the respective wireless carrier immediately and the FTC, FBI’s IC3, and the NJCCIC to limit proliferation.

 

Increase in Cryptocurrency Scams
The NJCCIC has observed increased reports of cryptocurrency scams over the past few weeks, consistent with open-source reporting . The scams begin with a sophisticated phishing attack, often initiated via social media direct messages or posts, and use a crypto wallet-draining technique to target a wide range of blockchain networks. These cryptocurrency stealers are malicious programs or scripts designed to transfer cryptocurrency from victims’ wallets without their consent. Attribution is frequently obfuscated as many of these campaigns are perpetuated by phishing groups that offer wallet-draining scripts in scam-as-a-service operations.
The cybercriminal begins the scam by creating fake AirDrop or phishing campaigns, often promoted on social media or via email, offering free tokens to lure users. The target is directed to a fraudulent website to claim these tokens, which mimics a genuine token distribution platform that requests to connect to their crypto wallet. The target is then enticed to engage with a malicious smart contract , inadvertently granting the cybercriminal access to their funds, which enables token theft without further user interaction. Cybercriminals may use methods like mixers or multiple transfers to obscure their tracks and liquidate the stolen assets. Social engineering tactics in recent campaigns include fake job interviews via LinkedIn, romance scams, and other quick cryptocurrency return promotions offered through various social media platforms.
Image source: ESET H2 Threat Report
According to ESET’s H2 Threat Report, the number of observed cryptocurrency threats decreased by 21 percent in the latter half of 2023; however, a sudden increase in cryptostealer activity was primarily caused by the rise of Lumma Stealer (78.9 percent), a malware-as-a-service (MaaS) infostealer capable of stealing passwords, multi-factor authentication (MFA) data, configuration data, browser cookies, cryptocurrency wallet data, and more. This infostealer was observed spreading via the Discord chat platform and through a recent fake browser update campaign. In this campaign, a compromised website displays a fake notice that a browser update is necessary to access the site. If the update button is clicked, the malicious payload is downloaded, delivering malware such as RedLine, Amadey, or Lumma Stealer to the victim’s machine.
The NJCCIC recommends that users exercise caution when interacting with social media posts, direct messages, texts, or emails that may contain misinformation and refrain from responding to or clicking links delivered in communications from unknown or unverified senders. Additionally, users are strongly encouraged to enable MFA where available, choosing an authentication app such as Google Authenticator or Microsoft Authenticator. In the case of credential exposure or theft, MFA will greatly reduce the risk of account compromise. If theft of funds has occurred, victims are urged to report the activity to the FBI’s IC3 immediately, their local FBI field office, and local law enforcement. These scams can also be reported to the NJCCIC and the FTC. Further information and recommendations can be found in the FTC article, the Cryptonews article, and the LinkedIn article.

 

Cloud Misconfigurations
Pose Risk for Data Exfiltration and Cyberattacks
Cloud environments are rich with sensitive data and have become a prime target for threat actors. They can be large, and the multiple applications, connections, and configurations can be difficult to understand and monitor. Cloud security failures occur due to manual controls—including settings and access privileges—not being set correctly, and organizations have mistakenly exposed applications, network segments, storage, and APIs to the public. This complexity creates a risk of breach, and victims often do not know that their cloud environments have been breached. According to IBM’s Cost of a Data Breach Report 2023, misconfigured cloud infrastructure resulting in data breaches cost an average of $4 million to resolve. Threat actors typically access and exfiltrate data via exploitable misconfigured systems and involve the loss, theft, or compromise of personally identifiable information (PII), which can be used to conduct subsequent cyberattacks.
Recent incidents of misconfigurations highlight cloud security risks and the need for organizations to secure their cloud environments to help prevent data from being mistakenly exposed. For example, researchers discovered a dual privilege escalation chain impacting Google Kubernetes Engine (GKE) due to specific misconfigurations in GKE’s FluentBit logging agent and Anthos Service Mesh (ASM). The vulnerabilities in the default configuration of FluentBit, which automatically runs on all clusters, and in the default privileges within ASM were identified. When combined, threat actors can escalate privileges with existing Kubernetes cluster access, enabling data theft, deployment of malicious pods, and disruption of cluster operations.
Additionally, a Japanese game developer, Ateam, having multiple games on Google Play, insecurely configured a Google Drive cloud storage instance to “Anyone on the internet with the link can view” since March 2017. The misconfigured instance contained 1,369 files with personal information, including full names, email addresses, phone numbers, customer management numbers, and terminal (device) identification numbers. Search engines could index this information, making it more accessible to threat actors.  Furthermore, the TuneFab converter, used to convert copyrighted music from popular streaming platforms such as Spotify and Apple Music, exposed more than 151 million parsed records of users’ private data, such as IP addresses, user IDs, emails, and device info. The exposed data was caused by a MongoDB misconfiguration, resulting in the data becoming passwordless, publicly accessible, and indexed by public IoT search engines.
The NJCCIC advises organizations to secure cloud services properly, remain vigilant with unsolicited and suspicious communications, especially after exposed information, keep systems up to date and apply patches as they become available and after appropriate testing, enable strong endpoint security, enforce cyber hygiene , segment networks, apply the Principle of Least Privilege, encrypt sensitive data at rest and in transit, create and test continuity of operations plans (COOPs) and incident response plans, and establish a comprehensive data backup plan that includes performing scheduled backups regularly, keeping an updated copy offline in a separate and secure location, and testing regularly. Organizations are advised to engage in pre-emptive threat hunting, conduct vulnerability scanning and ransomware readiness assessments, and adhere to cybersecurity best practices.

 

FBI Warns of New Tech Support Scam Targeting Senior Citizens
The FBI recently released a public service announcement, which warned of an uptick in the use of courier services  to collect money and valuables from targets of scam activities. In such social engineering attempts, scammers may use a multi-layer approach to impersonate a US Government official, a tech support worker, and an employee of a financial institution to convince potential victims that trusted sources are speaking to them. 
In one scheme, threat actors inform victims that their financial accounts have been hacked or are at risk of being hacked and advise them to protect their funds by liquidating their assets, often into gold or other precious metals. Victims are then convinced to meet with a courier at their home or public locations to hand off the requested assets. In some instances, passcodes may be given to the victim to add authenticity to the scam. 
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from clicking on online pop-up notifications, calling numbers displayed on unverified websites, or sharing personal information such as home addresses and account numbers with an unknown caller. The US Government and other legitimate businesses will not advise liquidating assets to purchase precious metals. If victimized, users are encouraged to report the activity to the FBI IC3 and the NJCCIC.

 

Sextortion and Romance Scams:
Dodging Cupid’s Malicious Arrow

As Valentine’s Day approaches, threat actors may attempt to prey on individuals seeking companionship or romance. The NJCCIC continues to receive reports of sextortion incidents in which victims are threatened with the release of compromising or sexually explicit photos or videos if they do not pay an extortion demand. Some sextortion threats are not credible, as threat actors are unable to provide proof of such photos or videos. However, there is an increase in reported sextortion incidents in which threat actors pretended to be trusting potential love interests. In several recent incidents, threat actors posed as attractive females to target their victims, build trust, and convince them to send compromising or sexually explicit photos or videos.

Threat actors use social engineering tactics to lure their victims via email, text message, chat, and video chat apps (such as Snapchat, WhatsApp, Skype, and Kik), social media platforms (such as Instagram, Facebook, and Wizz), or dating apps (such as Grindr and Hinge). They may initiate communication through one of these platforms and then move to other platforms. They build trust with their victims and convince them to divulge personal information—such as phone numbers, family members, employers, and social media account information—before threatening to post the photos or videos to the victim’s social media platforms or release them to family members, friends, or employers. They may also threaten to upload explicit photos or videos to various pornographic websites if payment is not made. Extortion payments are typically demanded to be sent via Zelle, Venmo, Cash App, MoneyGram, Bitcoin, Coinbase, or gift cards. Similar to sextortion, threat actors may engage in romance scams by posing as potential love interests and building trust with a victim to establish a relationship quickly. Eventually, they may create a fake emergency and request the victim send money to help. They may also encourage victims to make cryptocurrency investments that turn out to be scams

Sextortion and romance scams continue to be successful as threat actors change tactics to coincide with trends and topics of interest to increase their likelihood of a reward or payout. To help counteract these scams, the New Jersey Senate passed legislation last year to make sextortion a third-degree crime punishable by up to five years in prison and a $15,000 fine. For victims who are minors or adults with developmental disabilities, the offense would be a second-degree crime punishable by up to 10 years in prison and a $150,000 fine.

The NJCCIC recommends users educate themselves and others on this and similar scams to prevent future victimization. Please review the Beware of Sextortion and Romance Scams NJCCIC product. The NJCCIC also advises against paying ransoms of any kind, as these scams are typically not considered credible threats unless photos or videos are provided. Users are advised to inspect questionable requests for typical  indicators of these scams, exercise caution with unsolicited communications, and refrain from providing photos or videos, personally identifiable information (PII), financial information, or funds. Users are encouraged to report cyber incidents via the NJCCIC Cyber Incident Report Form, the FBI’s Internet Crime Complaint Center (IC3)  website, and their local police department. Users are also advised to report scams or abuse to associated email providers, social media platforms, or dating apps, especially if there is a violation of terms and conditions or acceptable use policies.

Beware of Tax Scams

During tax season, threat actors target taxpayers and their data to file fraudulent tax returns, collect refunds, and engage in other identity theft schemes. Threat actors seek out tax information, including W-2 and personally identifiable information (PII) – such as Social Security numbers (SSNs), dates of birth, bank account or credit card numbers, and driver's license numbers. They rely heavily on social engineering tactics conducted through email, phone, and text messages. These social engineering scams attempt to appear convincing and authentic to trick recipients into disclosing sensitive information, financial data, or credentials for online accounts. If they can steal a target's data and identity, they could also steal their tax refund. For information on common tax scams and recommendations to help protect your identity, data, and tax refunds, continue reading…

 

From Life Lock & Norton

LifeLock by Norton™
!
Data Breach Notification
Data breach exposes American Express credit cards
Why are you receiving this?
A security incident has surfaced. You may or may not have been affected, but as always, we want to make you aware of the incident and remind you that you can take steps to help protect yourself. Check to make sure that you’re responding to LifeLock alerts, updating any software you use, changing your passwords often, and always watching out for phishing attempts.
What happened?
American Express is warning card members of a third-party data breach. Several other companies that use the hacked merchant processor could also be affected. Exposed American Express Card member data includes account numbers, names, and expiration dates. If exploited, cybercriminals can use this information to commit identity theft.
We have your back.
You can feel confident knowing that your membership gives you the tools you need if your information becomes exposed from this incident or others. You’ll get an alert if we detect possible fraudulent use of your information or find it on the dark web. If you become a victim of ID theft, we work to fix it.
Any new info you’d like us to monitor?
Your plan already includes Dark Web Monitoring, so make sure your information is complete and current. Take a moment to add or update information like your email, home address, phone number, credit card numbers, and more. We’ll send you a notification if we detect your personal information on the dark web. In the event this happens, please refer to our dedicated support page.

 

 

Change Healthcare Ransomware Attack Highlights Far Reaching Impacts of Cyber Incidents
A ransomware attack impacting Change Healthcare, one of the largest healthcare technology companies in the US, showcases the cascading impacts of a cyberattack. The incident, which occurred on February 21, crippled pharmacies across the nation, including military pharmacies, CVS Health, and Walgreens, causing a significant backlog of unprocessed prescriptions. The pharmacies implemented workarounds  to continue to serve patients, though some patients are being asked to pay full price for medications until claims can be processed. In addition, hospitals unable to process claims may be losing millions of dollars per day while Change Healthcare works to recover from the cyberattack. The cyber threat actors behind the attack – ALPHV/BlackCat affiliates – are alleged to have stolen sensitive personal health information (PHI) regarding patients and customers, and threatened to disclose this information if they were not paid the ransom demand. On March 5, a payment  of $22 million was made to the ALPHV/BlackCat operators. It is assumed that Change Healthcare initiated this transaction.
The NJCCIC recommends reviewing the recent Cyber Threat Highlight “The Current Threat Landscape of Healthcare” for information on recent targeting of the Healthcare and Public Health sector and mitigation strategies to help reduce cyber risk. Additionally, the This is Security post “Supply Chain Security ” and Cyber Threat Highlight “ Supply Chain: Risks to Users and Organizations Continue” provide users with information on the risks associated with the supply chain and potential cascading impacts of cyberattacks.

 

Sophisticated Phishing Scheme Impersonating FCC, Cryptocurrency Platforms, and SSOs
Replica of the legitimate Okta SSO page for the targeted organization.
Image Adapted From: Lookout
Researchers discovered a sophisticated phishing scheme of fraudulent URLs, login pages, a sense of urgency and legitimacy, and persistent communication through mobile devices. The phishing kit revealed the creation of replicas of email/single sign-on (SSO) services and various social engineering tactics—such as phishing, vishing, and SMiShing—to impersonate an organization’s customer support, target their employees or users who are primarily in the United States, and deceive them into divulging login credentials, password reset URLs, and photo identifications.
For example, threat actors registered a domain with one character different than the legitimate Federal Communications Commission (FCC) Okta SSO page to create a phishing site. To develop a sense of legitimacy and evade detection of their phishing campaign, they convinced the target to complete a captcha using hCaptcha . Once completed, the replica of the legitimate FCC Okta SSO page loaded to prompt the target to enter their credentials. If entered, the target was sent to a purported loading page to wait while their information was verified. In the background, threat actors monitored the phishing page through an administrative console in real time to steal and use the login credentials. Then, they redirected the target to customized pages depending on the target’s multi-factor authentication (MFA) service, such as an MFA token from an authenticator app or an SMS-based token. Once entered, the threat actors captured the information and attempted to log into the FCC. At the same, the target was directed to any page or a custom page with different scenarios, such as the account being under review and advising to try to log in later at a specified date or time.
Although the phishing kit targets the FCC and impersonates their legitimate SSO page by default, it became more apparent that threat actors can potentially impersonate other organizations and brands, as evident with other discovered impersonation pages of cryptocurrency platforms—such as Binance, Coinbase, and more—and email/SSO services—including AOL, Gmail, iCloud, Okta, Outlook, Twitter, and Yahoo. This scheme seems to have similarities to Scattered Spider, including the impersonation of Okta, domain registrations of organizationname- okta.com, and homoglyph techniques, which leverage fraudulent domain names that appear legitimate due to similar-looking alphabets or characters. However, this attribution is unlikely since there are differences in the phishing kit’s capabilities and command and control (C2) infrastructure.
We recommend that users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from responding to unsolicited communications, clicking links, or opening attachments from unknown senders, exercise caution with communications from known senders, and only submit account credentials on official websites. If unsure of the legitimacy, contact the sender via a separate means of communication, such as by phone, from trusted sources before taking action.
Compromised accounts should be logged out of all devices, and any access tokens should be revoked. The associated password should be reset and MFA enabled, choosing a more secure method (authentication app, biometric, or hardware token) where available. If you suspect your PII has been compromised, please review the Identity Theft and Compromised PII  NJCCIC Informational Report for additional recommendations and resources, including credit freezes and enabling MFA on accounts. Additionally, we advise reporting suspicious or fraudulent communications to the respective entity. Impersonation scams and other malicious cyber activity can be reported to the NJCCIC.

 

2024 Q1 Top Ransomware Trends
The NJCCIC continues to receive reports of ransomware incidents impacting New Jersey private organizations and the public sector. Threat actors primarily targeted critical infrastructure and educational institutions, likely due to budgetary restraints, limited resources, and reliance on third-party vendors. These incidents resulted in financial losses, operational disruptions, and the loss of confidentiality, integrity, and availability of data and information systems. For the first quarter of 2024, we review the top ransomware variants reported to the NJCCIC, highlight ransomware trends, and provide recommendations to educate users and organizations to reduce the likelihood of victimization.
For the first quarter of 2024, ransomware incidents reported to the NJCCIC consisted of Akira, LockBit, and Play ransomware. There was a sharp increase in Akira ransomware attacks, particularly after the LockBit ransomware group’s takedown. Akira ransomware operators are known for their sophisticated attacks, especially against US healthcare organizations. However, after the takedown, LockBit quickly relaunched operations to stay active and focused on targeting government agencies and critical infrastructure organizations, including healthcare. Also, cyberattacks targeting ConnectWise ScreenConnect vulnerabilities were linked to both LockBit and Play ransomware. Although existing ransomware groups continue their efforts, new ransomware gangs have initiated operations in 2024.
The top attack vectors for ransomware are phishing, compromising valid accounts, and external remote services. Threat actors are using artificial intelligence at an increased rate to generate targeted and sophisticated phishing campaigns and launch successful, profitable ransomware attacks. They also exploited vulnerabilities to infiltrate systems and networks, as predicted in the mass exploitation of technologies supporting hybrid and remote work and enterprise third-party file transfer solutions, such as virtual private networks (VPNs), cloud-based storage, and multi-factor authentication (MFA) tools.
An example of an initial attack vector in ransomware incidents reported to the NJCCIC was unauthorized remote login access via a VPN service. One of the tactics used was MFA prompt bombing , in which threat actors obtained account credentials and attempted to log in multiple times. They sent an overwhelming number of MFA authentication requests, hoping that the target would be distracted and unintentionally provide access or eventually give in due to fatigue and approve the request. The target could refrain from resisting temptation and approving the multiple notifications. This observed tactic has recently evolved into the threat actors calling the target from a spoofed support number to convince them to initiate a password reset and divulge the one-time password reset code.
Once threat actors gained unauthorized access, they infiltrated the target organization, gained access to internal systems, and moved laterally to other critical systems. Once data was exfiltrated, they encrypted systems and servers, shutting down access to critical services and files containing personally identifiable information (PII) and financial information. Additionally, the ransomware incidents affected onsite backups; therefore, victim organizations had to resort to offsite backups, if available and viable for restoration.
Ransomware remains a prevalent threat as extortion tactics continue and evolve to pressure victim organizations to pay the ransom. Threat actors used extortion tactics, such as denying access to encrypted files, stealing data, and threatening a data breach by posting on public ransomware leak sites or releasing the stolen data to regulators, clients, or patients. The additional tactic of swatting to pressure the victim organization into paying the ransom and gaining media coverage raises public safety concerns.
The NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Remain vigilant, keep systems up to date, apply patches as they become available, enable strong endpoint security, and enforce cyber hygiene. Additionally, implement a defense-in-depth strategy , segment networks, apply the Principle of Least Privilege, enable MFA where available, encrypt sensitive data at rest and in transit, use a VPN, create and test continuity of operations plans and incident response plans, and establish a comprehensive data backup  plan that includes performing scheduled backups regularly, keeping an updated copy offline in a separate and secure location, and testing regularly. Organizations are advised to develop and enforce robust data protection policies, conduct cybersecurity training for employees, provide transparency about data collection practices, engage in pre-emptive threat hunting, conduct vulnerability scanning and ransomware readiness assessments, and adhere to cybersecurity best practices.
The NJCCIC provides further information and recommendations in the Ransomware: The Current Threat Landscape and the Ransomware: Risk Mitigation Strategies  NJCCIC products. We recommend recipients of extortion calls notify their local police department immediately if they are threatened with arrest or a law enforcement response by the caller. Cyber incidents can be reported to the FBI’s IC3 and the NJCCIC.

 

FTC Reports $1.1 Billion in Losses from
Impersonation Scams in 2023
The Federal Trade Commission (FTC) released a report stating that over $1.1 billion in losses from impersonation scams were reported in 2023. The FTC’s report shows that 330,000 incidents were business impersonation scams, and nearly 160,000 were government impersonation scams, accounting for almost half of the frauds reported to the agency. Reports also show an increase in multi-stage impersonation scams where threat actors pose as more than one organization in a single scam. Threat actors may initially begin the scam by posing as an employee of a trusted organization and then transfer the target to someone claiming to be from a bank or government agency to add legitimacy to their scam.
Phone calls are still the top reported initial stage of impersonation scams but have seen a sharp decline compared to 2020. Emails are a close second, followed by text messages, and both have steadily increased in usage over the past few years. The below list of scams accounted for nearly half of the reported 2023 scams.  
  • Copycat Account Security Alerts: Threat actors initiate fraudulent messages of suspicious account activity or unauthorized charges, claiming to be from a trusted organization or bank. They try to persuade their target to transfer funds or move money to a Bitcoin ATM, claiming it will help “protect” their funds.
  • Phony Subscription Renewals: Users receive a notice claiming that a subscription or account will auto-renew, often claiming the charge will be for a few hundred dollars. Threat actors sometimes try to convince their target to allow them to connect to their computer, making it appear that they “accidentally” refunded too much money to the target. The threat actors demand that the refund be returned, often through the purchase of gift cards.
  • Fake Giveaways, Discounts, or Money to Claim: Threat actors send a message about a giveaway, discount, or unclaimed money. These messages appear to be sent from organizations, such as internet service providers, retailers, or the Publishers Clearing House. These scams require purchasing gift cards or transferring funds to receive a gift or discount.
  • Bogus Problems with the Law: Threat actors impersonating government agents contact the target, claiming their identity has been used to commit a serious crime. They offer to help fix the problem, often by having their targets purchase gift cards or transfer funds to Bitcoin ATMs (or “safety lockers”) to protect their funds during the supposed investigation.
  • Made-up Package Delivery Problems: Threat actors send messages claiming to be from carrier services, stating they are having problems making the delivery. These messages will include a link to the spoofed website of the carrier’s website, which may prompt for credit card or bank account information for a small redelivery fee. 
On April 1, the FTC announced a new rule regarding the impersonation of government agencies and businesses. This rule gives the agency more robust tools to fight and deter potential scammers. Due to the new rule, the FTC can file federal court cases seeking money back for victimized consumers and pursue civil penalties against those who violate the rules.
NJCCIC recommends users and organizations educate themselves and others on these continuing threats and tactics to reduce victimization. Users are advised to refrain from responding to unsolicited communications, clicking links, or opening attachments from unknown senders, and exercise caution with communications from known senders. Users are also urged to avoid calling numbers displayed in unverified emails or sharing personal information with unsolicited communications.
We remind users to refrain from complying with requests to purchase gift cards and sending the numbers to someone without first verifying the request via a separate means of communication. The US government and other legitimate businesses will not advise the purchase of gift cards, Bitcoin, or request money transfers. These are unusual requests or demands, typically portraying a sense of urgency, and should be handled with increased suspicion. If victimized, users are encouraged to report scams to the FTC, FBI’s IC3, and the NJCCIC.

 

Unpaid Road Toll SMiShing Scams
The FBI released a public service announcement warning of an uptick in unpaid road toll SMiShing scams. Since the scams started in early March 2024, over 2,000 complaints have been made to the FBI from at least three states, and it appears to be moving from state to state, including New Jersey, New York, and Pennsylvania. On April 12,  the New Jersey Turnpike Authority issued a statement alerting drivers that the scam had begun to target drivers throughout the state.
The fraudulent SMS text messages contain almost identical language, including a similar amount owed for the “outstanding toll amount.” However, threat actors impersonate the target state’s toll service name and change the sender’s phone number and link in the message depending on the state. This social engineering attack appears to be an attempt to trick users into providing personal and financial information.
Recommendations
  • Avoid clicking links, responding to, or otherwise acting on unsolicited text messages.
  • Confirm requests from senders via contact information obtained from verified and official sources.
  • Type official website URLs into browsers manually.
  • Report SMiShing to the FTC, FBI's IC3, and NJCCIC, and forward the message to 7726 (SPAM).

 

New DarkGate Campaign
Example of email included in DarkGate Campaign  
The NJCCIC observed a DarkGate malware campaign being deployed via malicious software installers embedded in phishing email attachments. Threat actors were also observed exploiting the Windows Defender SmartScreen vulnerability (CVE-2024-21412). DarkGate is a remote access trojan (RAT) within the Malware-as-a-Service (MaaS) model, allowing threat actors to purchase and deploy the variant. These emails included Microsoft Excel attachments (.XLSX) that contain an "Open" button image linked to a VBScript on an SMB share. If the image is clicked and warnings are accepted, a remote VBS is executed. The VBS then initiates the download of various files using PowerShell, including a hex-encoded AutoHotkey executable which is decoded to execute DarkGate. DarkGate’s command and control (C2) infrastructure includes irreceiver[.]com and 103[.]114[.]162[.]75.
DarkGate has been known to impact critical infrastructure and is capable of providing remote access, keylogging, sandbox evasion, and deploying subsequent malware in the victim's environment memory. While not necessarily attributed to any one sophisticated threat actor group, the malware has used similar tactics, techniques, and procedures (TTPs) to the group 0ktapus, aka Scattered Spider, and has been deployed by TA571, TA577, and the ransomware groups BianLian and BlackBasta.
Recommendations
  • Avoid clicking links and opening attachments in unsolicited emails.
  • Confirm requests from senders via contact information obtained from verified and official sources.
  • Type official website URLs into browsers manually.
  • Facilitate user awareness training to include these types of phishing-based techniques.
  • Consider blocking port 445/SMB at the external firewall. In theory, blocking this connection will halt the execution of DarkGate if it cannot download its own install scripts.
  • If your organization does not use Autohotkey, do not allow this executable to run in the environment.
  • Maintain robust and up-to-date endpoint detection tools on every endpoint.
  • Consider leveraging behavior-based detection tools rather than signature-based tools.
  • This activity can be reported to the FBI's IC3 and NJCCIC.

 

Ransomware Visit: StopRansomware.gov

www.publicsurplus.com

US intel: Putin misled by advisers - Click Here

8 Ways to Make Your LinkedIn Profile Stand Out - Click Here

Outside Looking In - Click Here

Multiple recalls issued for vehicles - Click Here

AT&T probing data leak affecting millions - Click Here

Deepfakes disgusting - and just beginning - Click Here

Banks: People should stop writing checks - Click Here

Global threat from plastics is growing - Click Here

Drone delivery may become more common - Click Here

Facebook's video player looks to ease sharing - Click Here

No word on closures as Red Lobster seeks buyer, explores bankruptcy - Click Here

16 charged in 'grandparents scam' that stole millions - Click Here

*** Judge in Menendez case: Stop wasting time - Click Here - Not Linked!!

*** Greene to call for Johnson ouster vote - Click Here - Not Linked!!!!

New poll shows Trump leading Biden by 6 points - Click Here

Zillow ad spot fries back at 'Bluey' episode - Click Here

House Dems say Johnson ouster 'will not succeed' - Click Here

Willams-Sonoma fined $3.2M for false claims - Click Here

Fatal crashes spur inquiry into Ford's hands-free driving tech - Click Here

Saying Trump is pro-life is truly 'fake news' - Click Here

Trump to receive $1.17 billion Truth Social stock bonus - Click Here

Trump campaigning from courtroom - Click Here

US announces new curbs on exports of firearms - Click Here

Contrasts seen in Trump Supreme Court, NY cases - Click Here

Donald Trump - Hush Money trial should be televised - Click Here

Biden signs $95 billion foreign aid bill - Click Here

FDA OKs cell therapies for treating earlier stages of type of blood cancer - Click Here

Students miss more school now than pre-COVID - Click Here

Study: chatbots show bis based on prompted name - Click Here

Tesla scraps plans for inexpensive car - Click Here

New student loan forgiveness on tap - Click Here

Trump says he opposes national ban on abortion - Click Here

Special counsel: Reject immunity claim - Click Here

Americans struggling to pay for utilities - Click Here

Biden, Japan leader likely to discuss bullet train idea - Click Here

Collapse puts focus on migrant workers - Click Here

No toxics found in water from ship hitting bridge - Click Here

What the future holds for NJ's Dollar Tree, Family Dollar stores - Click Here

We need millions more FAFSA applications - Click Here

Tupperware Brands faces liquidity crunch - Click Here

Planters looking for its next 'Peanutters' - Click Here - BeAPeanutter.com - by April 14, 2024.

Prosecutors call judge's jury instructions 'wrong' in Trump documents case - Click Here

House Republicans open probe of 'pervasive' antisemitism at Rutgers - Click Here

Sheriff's death puts spotlight on high-stress job and fatality rates - Click Here - Bee note; This is to give some information about menial health. Please call, text 988 or visit 988lifeline.org fro 24/7 access to free and confidential services.

Is that phone call asking about COVID vaccines legitimate? Click Here

Bill includes antisemitism monitor for universities - Click Here

World courts order Israel to halt famine - Click Here

Why are diabetes, obesity drugs so pricey? - Click Here

Avoid using AI with tax preparation - Click Here

Menendez won't appeal court's decision - Click Here

Menendez's defense may target his wife during trial - Click Here

Menendez has raised about $189K for legal defense so far in 2024 - Click Here

Trial fro Senator Menedez and co-defendants delayed - Click Here

Bill to force TikTok sale now tied to foreign aid - Click Here

Senate votes to extend government spying law - Click Here

Musk says Tesla to unveil robotaxe self-driving car - Click Here

Don't respond to 'can you hear me' phone calls - Click Here

Tariff threat comes as election looms - Click Here

Report: Infinite scrolling dangerous for teenage - Click Here

Chief scientist at WHO sounds alarm on bird flu - Click Here

Justices to consider 'ghost guns' case - Click Here

Tesla to drop prices on three models after decline in sales, production miss - Click Here

Instagram influencer Mazini gets 7 years for $8M fraud - Click Here

FCC reinstates net neutrality rules - Click Here

Nursing home law will require more staffing - Click Here

Arizona's fake 2020 electors indicted - Click Here

Trump's promises seem to be at odds - Click Here

Trump looks to Nixon in high court case - Click Here

Trump funnels funds to his businesses - Click Here

Shadow of ex-president's campaign, rhetoric looms large over proceedings - Click Here

Fighting Online exploitation of children - Click Here

US seeks to delay

trial set for May - Click Here

Chemical plants must limit emissions - Click Here

Spying law reignites House GOP infighting - Click Here

Trump posts $175M bond to shield assets - Click Here

Trump sends mixed signals on who is welcome in GOP - Click Here

Judge agrees to shield witness in Trump case - Click Here

Incumbents follow trump on abortion - Click Here

Biden blames Trump for Arizona abortion ruling - Click Here

High-flying Trump stock hits turbulence - Click Here

Many bet on Truth Social as "meme" stock - Click Here

Move to oust Johnson on hold amid 2-233k recess - Click Here

Baltimore bridge salvage work begins - Click Here

Food court crackdown may be coming at Costco - Click Here

6.9M US seniors live with Alzheimer's Click Here

IRS: $1B in unclaimed tax refunds for 2020 to expire - Click Here - deadline May 17, 2024

Breaking down Biden's student debt relief plan - Click Here

New rules take aim at 'gun show loophole; Online sales - Click Here

House GOP in turmoil after vote fails - Click Here

Trump says he wouldn't sign federal abortion ban - Click Here

Trump's gag order for hush money payments trial - Click Here - April 15, 2024

Trump's media company soars in first day of trading on Wall Street - Click Here

Realtor.com adds climate risk to listings - Click Here - Realtor.com

Climate is new factor for region's homebuyers - Click Here

First ever digital SAT exam results posted - Click Here

Collage aid process hits another snag - Click Here

Some cancers afflicting young adults - Click Here

Measles vaccines should last a lifetime - Click Here

Health experts weight in on what vaccines adults need - Click Here

Kids can buy ammo Online, group finds - Click Here

Blame for wave of crimes is misguided - Click Here

WMO issues 'red alert' on climate change - Click Here

US calls a smartphone monopoly - Click Here

Biden cancels billions more in student loan debt for public service workers - Click Here

Student loan default can affect Social Security - Click Here

Counseling center owner admitted health care fraud, feds say - Click Here

Nadine Menendez lawyer may have to testify - Click Here

Primary wins set stage for Biden, Trump rematch - Click Here

Justices weight if officials went too far - Click Here

Joann files for bankruptcy, plans private ownership - Click Here

Trump flip-flops on baning TikTok - Click Here

The 6% real estate commission dead after Realtor group settle lawsuit - Click Here

Companies haven't paid income tax - Click Here

IRS launches free Direct File pilot program - Click Here

Georgia judge dismisses some charges against Trump - Click Here

House passes bill that could ban TikTok - Click Here

Virtual viewing not an option - Click Here

Never fades away - Click Here

Biden, Trump close to clinching races - Click Here

Hur defends his assessment of Biden - Click Here

Menendez set to face new charges at arraignment - Click Here

Sky-high stakes for State of the Union - Click Here

Trump's 'purge' worries some in GOP - Click Here

Can voters tolerate Trump's alleged crimes? - Click Here

Biden says he would sign bill that could ban TikTok in US - Click Here

Drugmaker shames weight loss drug craze - Click Here

Seresto agrees to $15M settlement for pet collars - Click Here - Seresto.com

Supreme Court pauses Texas migrant arrest law - Click Here

Trump fights gag order in NY hush money case - Click Here

Credit card late fees to be capped at $8 - Click Here

January 6 trials could still happen before election - Click Here

Student debt relief delayed for many - Click Here

Student loan firm accused of avoiding calls - Click Here

Feds hit senator with new set of charges - Click Here

Truth Social co-founders sue Trump in Delaware - Click Here

Most teachers discuss race; ewe wan to talk LGBTQ+ - Click Here

Trump firm's former CEO pleads guilty to perjury - Click Here

What expenses qualify for tax breaks? - Click Here

$118B border deal includes Ukraine - Click Here

AT&T offering $5 credit for customers affected by outage - Click Here

Feds poised to make big change to marijuana rules - Click Here

What to know about the changes for the SAT as it goes all digital in March [2024] - Click Here

DOT aims to help airline passengers with disabilities - Click Here

Microsoft chatbot under fire for harmful responses - Click Here

FBI chief expects wave of election threats this year - Click Here

Big Tech pledges deep-fake crackdown - Click Here

More states pass restrictions on sex education - Click Here

Scammers target tax agencies for your infor - Click Here

Amazon sued over surprise Prime charges - Click Here

Free help available for filing tax returns - Click Here

Over 120,000 gun safes recalled - Click Here

Macy's to shut down 150 'under-productive' stores - Click Here

Prosecutor asks for gag order in Trump's hush money case - Click Here

3 congressional fights may affect your finances - Click Here

Trump appeals $45.4M ruling in fraud case - Click Here

NJ property tax Rates found to be highest - Click Here

Justices say kindness helps avoid polarization - Click Here

Georgia prosecutor tries to block lawyer's testimony - Click Here

Biden considering new executive action on border - Click Here

Google suspend Gemini AI chatbot's ability to generate image of people - Click Here

Students can take longer to accept aid offers - Click Here

Hunter Biden lawyer blasts evidence in federal gun case - Click Here

Biden cancels $1.2B more in student loan debt - Click Here

Prosecutors: Biden accuser had 'extensive' contact with Russian intelligence - Click Here

Legal 'gas station heroin," sold in NJ, can causes seizures and death - Click Here

Biden says he'll hit Russia with major sanctions' Click Here

Justices to her smog reduction plan - Click Here

Judicial nominee looks to make history while facing 'bigotry' - Click Here

Haley: Congress 'lying' on border, aid measure - Click Here

GOP grows reluctant to confront Putin - Click Here

Lawmakers seek to close drug company loophole - Click Here

Lawmakers look for backup plan - Click Here

Wind solar power do work in extreme weather - Click Here

Spiting time? - Click Here

Trump threats put troops at risk, NATO leaders says - Click Here

Trump faces action in 5 court cases - Click Here

Fraud appeal likely to argue 'no victims' - Click Here

Needing cash, Trump turns up the sales pitches - Click Here

Menendez wants swift dismissal of case - Click Here

Biden goes on offense in border fight - Click Here

House Republicans vote to impeach Mayorkas - Click Here

Senate backs aid for Ukraine, Israel - Click Here

Dems seek workaround for Ukraine, Israel aid bill - Click Here

Speaking virtually, Austin pledges support for Ukraine - Click Here

Social media helps fuel climate change denial - Click Here

Take steps to avoid falling for romance scams - Click Here

Climate change denial surges Online - Click Here

More tax breaks for parents in the works - Click Here

Videos of layoff experience become latest viral trend - Click Here

Some prosecutors say Hur went too far - Click Here

Multiple states report new cases of measles - Click Here

Nose picking may have link to Alzheimer's disease - Click Here

Writing resume may be most crucial job skill - Click Here

Education officials try to ease FAFSA woes - Click Here

Arguments in insurrection case to begin - Click Here

House rejects push to impeach Mayorkas - Click Here

FBI report: crimes up at schools, colleges - Click Here

Party leaders divided on border deal - Click Here

Appeals Court: No immunity for Trump - Click Here

Trump asks justices to protect his voters' rights - Click Here

Trump's eligibility for election argued - Click Here

No charges sought for Biden over docs - Click Here

Senate advances $95 billion bill to aid Ukraine, Israel - Click Here

Justice Department targets alleged murder-for-hire plot - Click Here

IRS keeping close eye on cryptocurrency earnings - Click Here

History may decide Trump's ballot eligibility - Click Here

Trial date delayed in Trump's federal election case in D.C. - Click Here

Think before sipping from a Stanley tumbler - Click Here

CDC: Syphilis cases at highest level in decades - Click Here

Swift is newest MAGA target - even in NJ - Click Here - Nothing New

Menendez raised additional $195K for defense fund - Click Here

House GOP unafraid to kill border deal - Click Here

House pases bill to expand child tax credit, renew business breaks - Click Here

GM targets return of its hybrids to North America - Click Here

RSV, flu, COVID, stomach virus cases all on the rise - Click Here

Hospitals require masks again - Click Here - New Jersey

Insulin price cap benefits more Americans - Click Here

Watch out for this common Facebook scam - Click Here

CDC issues alert on rising measles cases globally - Click Here

Busy week in Menendez bribery trial - Click Here

Trump vows to appeal $83.3M ruling - Click Here

NH may have shown Trump's vulnerability - Click Here - bee note that the is just informaiton!!!

Talk urging violence doesn't get free speech protection - Click Here

Biden calls for 'massive changes' on immigration, says border is not secure - Click Here

Texas reshapes immigration debate - Click Here

More jobs, but jobless rate goes up - Click Here

Biden expands abortion, contraception protections - Click Here

Trump makes unusual call to unity - Click Here

Appeals court rejects Trump's bid on gag order - Click Here

Court: Feds can remove border wire - Click Here

Daibes gets court date in bank fraud case from 2018 - Click Here

Telehealth guidelines in NJ block best care, suit says - Click Here

Port Authority recovers $25M from toll cheats - Click Here

GOP senators break on border deal - Click Here

Menendez seeks to suppress evidence in corruption trial - Click Here

Legal battles, election dates could conflict - Click Here

With a therapist shortage in New Jersey, can mental health apps Fill the gap? - Click Here

How new parents get tax credits, deductions - Click Here

New FEMA rules aim, to cut red tape - Click Here

All state high school seniors will now get aid application - Click Here - New Jersey

Some useful tips to help you protect your care in frigid winter temperatures - Click Here

Feds charge 3 guards at Passaic County Jail - Click Here

DOJ: Consultant took job to leak Trump tax returns - Click Here

Justice skeptical of Chevron ruling - Click Here

Samsung phones vie to make AI mainstream - Click Here

Georgia DA blasts misconduct allegations - Click Here

Menendez and wife request separate trials - Click Here

Propose expands child tax credit - Click Here

Site targets NJ's stockpiles of reusable grocery bags - Click Here - litterfreenj.com

Gridlock threats student borrowers - Click Here

'People may be surprised' by 1099 form, experts say - Click Here

Rutgers is latest US school to face antisemitism lawsuit - Click Here

Meta to hide posts about suicide, eating disorders from teens. - Click Here

Taxation of Social Security benefits varies - Click Here

Cybersecurity an issues at water utilities - Click Here

Naloxone needed in first-aid kits, say experts - Click Here - New Jersey

Repaying student loans could result in tax break - Click Here

It's time: Menendez, indicted again, must leave office - Click Here

Biden takes fight over border wire to US Supreme Court - Click Here

Menedez's defense may hinge on patriotism - Click Here

Menendez defens himslef on floor of Senate - Click Here

Menendez files to have corruption indictment dismissed - Click Here

FAA starts probe of Boeing's adherence to safety rules - Click Here

Indictment highlights deep ties of Daibes, Menendez - Click Here

North Jersey towns urge Pascrell to support a cease-fire - Click Here

Law could clarify electoral vote count - Click Here

Biden-Trump rematch could shake politics -Click Here - Not Linked!!

Guardrails meant to preserve democracy - Click Here

Trump lied after I found no voter fraud - Click Here

GOP appeals Trump ballot ban in Colorado - Click Here

Menendez accused of influencing Qatar firm - Click Here

Biden takes fight over border wire to US Supreme Court - Click Here

Number of migrants brought by bus to NJ tops 1K - Click Here

Clinton, Trump named in Epstein files - Click Here

US debt hits record $34 trillion - Click Here

Trump sues over Maine ballot action - Click Here

Raskin: Thomas should skip trump ballot cases - Click Here

GOP rivals say they would pardon Trump if elected - Click Here

Ex-Trump aides warn of serious threats if he wins - Click Here

AI systems can detect guns, alert schools - Click Here

Social platforms need hate speech oversight - Click Here

Rural folks feel like they were left behind - Click Here

Experts say work-from-home model will continue - Click Here

Tax deadline is months away, but don't wait to file - Click Here

Trump faces many questions in 2024 - Click Here

What NJ residents need to know on Medicare Advantage - Click Here

Trump facing signs of political trouble in 2024 - Click Here

Hospital tool aims to end pricing surprises - Click Here

IRS delays new rules for payment app users - Click Here

Group calls for change in use of bodycam footage - Click Here

FDA rules change opens up new pool of blood donors - Click Here

The New York Times sues OpenAI and Microsoft over the sue of its stories - Click Here

Prosecutors seek to bar Trump lawyers from injecting politics into trial - Click Here

Immigration court backlog tops 3M cases - Click Here

Advocates criticize border proposals - Click Here

Supreme Court likely to hear ballot issue - Click Here

Few in Colorado joyful over Trump ruling - Click Here

Facial recognition tech banned at Rite Aid - Click Here

White House backs effort on EV charging - Click Here

Impeachment witness: Biden not involved in deals - Click Here

January 6 footage could be game changer - Click Here

Fare Warning - Click Here - New York MTA

US officials say 2022 election were secure - Click Here

Apple pauses certain watch sales over patent dispute - Click Here

Trump asks entire court of appeals to review gag - Click Here

Daibes seeks to postpone his trial - Click Here

Conflict will continue to stir passion on campuses - Click Here

White House involved in border talks - Click Here

Regulations will affect small business in 2024 - Click Here

Trump quotes Putin, evokes fascists at rally - Click Here

Santa, please help Congress protect our kids - Click Here

Some pet meds could harm humans, FDA says - Click Here

Could US economy dodge recession? - Click Here

Feds open investigation into antisemitic incidents at Rutgers - Click Here

House passes defense bill in last-minute spirit - Click Here

Santos lawyer optimistic about plea negotiations - Click Here

Trump denied immunity in Carroll defamation case - Click Here

Supreme Court to hear from January 6 defendant - Click Here

Student loan borrowers keep waiting for answers - Click Here

Supreme Court to consider abortion pill - Click Here

Hunter Biden seeks dismissal - Click Here

Hunter Biden defies GOP subpoena - Click Here

Georgia election worker says she feared for her life over lies - Click Here

GOP impeachment push like Dems', but less transparent - Click Here

Epic Games wins lawsuit against Google - Click Here

Jury seated in Giuliani damages trial - Click Here

Smith asks high court to rule on Trump claim - Click Here

CVS health to alter its drug payment model - Click Here

Why won't the Senate go after Menendez on ethics charges? Click Here

Pandemic led to kids in private schools - Click Here

Most Republicans hope Trump is GOP's nominee - Click Here

Trump says he'll be a 'dictator' only on Day 1' if he's reelected - Click Here

Liz Cheney warns voters must stop Trump from being reelected - Click Here

Why lawmakers are leaving Congress - Click Here

FBI director makes fresh pitch to renew spy program - Click Here

Buying an EV? Make sure to factor charger in cost - Click Here

Check the Online database; unclaimed money could provide a potential; financial windfall - Click Here - New Jersey.

US expanding high-tech cooperation - Click Here

Economists think nation can avoid a recession - Click Here

Trump gag orders difficult to enforce - Click Here

Will Santos ouster save GOP majority? - Click Here

School presidents walk back response on antisemitism - Click Here

Republicans in Senate block aid for Ukraine/Israel - Click Here

NYU faces lawsuit over hate speech - Click Here

Asylum-seekers sue US over Trump, Biden border policy - Click Here

Bergen influencer seek to redevelop school site - Click Here

Apple update may pose safety risk, local police say - Click Here

George Santos expelled from Congress in historic House vote - Click Here

Congress eyeing immigration limits - Click Here

Musk, suing an expletive, says he doesn't care about advertisers that fled X - Click Here

Consumer Rep rots pummels EV reliability - Click Here

Google project could be clean energy milestone - Click Here

Trump lawyers urge NY court to void gag order - Click Here

Lawyers: Trump had basis to question 2020 election - Click Here

Trump floats repealing 'Obamacare' - Click Here

NY's Santos says he will stand for expulsion vote - Click Here

Hunter Biden offers to testify at House hearing - Click Here

Students may soon learn about Sikhism - Click Here

Google to start deleting inactive accounts - Click Here

Digital wallets could face same regulation as banks - Click Here

Toys that can spy on kids are called a growing concern - Click Here

Eight ways residents can get homes ready for winter - Click Here

Phonics is hot again as NJ schools fight COVID learning loss - Click Here

Senate panel issues subpoenas to discuss children's safety Online - Click Here

Decision weakens enforcement of Voting Rights Act - Click Here

Ethics panel finds 'substantial evidence' Santos committed fraud - Click Here - Ethics panel finings

Electric ferries may set a new energy standard - Click Here

Ukraine aid tangled with border policy - Click Here

Toys R Us maybe in midst of resurgence - Click Here - macys.com/toysrus and ToysRUs.com

Government makes more free COVID-19 tests available - Click Here - COVIDtests.gov

UN: World racing past warming limit - Click Here

Supreme Court declines appeal in Chauvin case - Click Here

Cinnamon imports face FDA inspection - Click Here

NJ January 6 suspect a military police officer - Click Here

We can still learn from the wisdom of JFK - Click Here

Is honking horn free speech? High court asked to decide - Click Here

Remote work led to gains for some - Click Here

USDA map helps gardeners keep up with climate change - Click Here

Respiratory illness in dogs investigated - Click Here

Supermarket shoplifters find reusable bags handy - Click Here - A Bee note this is not a thin that shoppers should consider doing!!!!!

No quick fix - Click Here

Roller-Coaster week for Trump, GOP - Click Here - Bee does not look at this as a politician item!!

How will 2024 IRS tax brackets affect you? - Click Here

House dodges government shutdown - Click Here

Feeling sad as winter nears? How to cope with SAD - Click Here

First lady to lead initiative on women's health research - Click Here

Asians, Pacific Islanders face abuse - Click Here

Businesses push back on new NLRB rule - Click Here

Heat records grow as plant roasts - Click Here

Report IDs climate change villains: us - Click Here

Census Bureau: World's population over 8 billion - Click Here

Kindergarten vaccine exemption rates rise i 41 states, CDC finds - Click Here

Meta knows it's harming our kids, so we are suing - Click Here

Change could be coming to real estate commissions - Click Here

Rite Aid is selling 7 NJ leases amid bankruptcy - Click Here

After four-month strike, actors reach $1 billion deal with Hollywood studios - Click Here

FBI searching for Capitol riot suspect - Click Here

The FBI manhunt for Gregory Yetman is over - Click Here

10 alleged Gambino members arrested - Click Here

Will daylight saving time end permanently? A Senate bill would do that - Click Here

Daylight saving time's end provides health benefits, doctors say - Click Here

74% of people in poll want to stop annual clock change entirely - Click Here

Data: More babies dying in 1st year - Click Here

Stores weigh tech's worth - Click Here

Victims of Bergen influencer's alleged scheme speak out - Click Here

3 justices to watch in gun law case - Click Here

2 NJ schools want colleges to show plans for boosting Jewish safety - Click Here

Orsted wants out of $300M forfeiture - Click Here

Johnson's stand on elder benefits unclear - Click Here

Job market shift boosting employers - Click Here

He believes Trump is president - Click Here

What will you pay in NJ for Obamacare in 2024? - Click Here - getCovered.nj.gov - Healthcare.gov

Judge sets rules for juror search in Trump's Georgia trial - Click Here

Danish company pulls out of NJ offshore wind project - Click Here

NJ finds $1M in bad Medicaid claims - Click Here

Students hope app helps make EMT work easier - Click Here

Should government regulate social media? - Click Here

Young employee focused on flexibility - Click Here

Initiative aimed at affordable housing - Click Here

McDonald's ditching its McFlurry "spindle' - Click Here

Michigan clash is free speech test - Click Here

Biden pitching narrower student loan relief proposal - Click Here

Judge to US: Stop cutting razor wire Texas installed - Click Here

FDA warns many eye-drops can cause infections - Click Here

NYC to give free, 1-way tickets to migrants - Click Here

Could daylight saving time be sunsetting in United States? - Click Here

Does ADHA raise risk of dementia? - Click Here

USPS's new policy requires ID verification - Click Here

EPA to propose stiffer lead pipe rules - Click Here

Low EV demand worrying car-makers - Click Here

NJ, other states sue Meta over impact of social media on young - Click Here

USPA touts 600+ arrest in postal crime crackdown - Click Here

Moderates not worried by speaker's vote record - Click Here

Prosecutors ask judge to reinstate Trump gag order - Click Here

Americans using cards may face more fees - Click Here

Medicare Part B cost in 2024 to rise 6% - Click Here

'Dreamers' forming strategy to keep DACA alive - Click Here

Tradition of toy trucks will live on after merger - Click Here - HessToyTruck.com

Trump settles into role of defendant - Click Here

Americans' faith in institutions wanes - Click Here

Senator Clueless? What was Menendez thinking? - Click Here

4 unique gifts for busy professionals - Click Here

Chinese firm Baidu unveiled AI model - Click Here

Europe looking to fight flood of Chinese EVs - Click Here

Amazon tests drones to drop off medicine - Click Here

Amazon delivers meds via drones - Click Here

Poll shows Biden, Trump tied at 37% - Click Here

Reports: Loan plan will help undergrads - Click Here

Real estate investor, influencer charged in scheme - Click Here

Sidney Power pleads guilty in election case - Click Here

Ellis pleads guilty in Georgia election case - Click Here

Rite Aid to close more stores - Click Here

Trial could change search habits - Click Here

Many in state seek stigmatized treatment - Click Here - New Jersey

Fall vaccination season gets underway - Click Here

Student loans forgiven for 804,000 - Click Here

Student loan payments due again - Click Here

Social Security benefits to rise by 3.2% in 2024 -Click Here

ANCHOR payments are released - Click Here - in New Jersey

Pharmacies to offer birth control over the counter - Click Here

Gaetz is helping Biden by sinking GOP's 2024 hopes - Click Here

IRA saving for small-business workers near - Click Here

Biden presses for more student debt relief as payments resume - Click Here

MTA seeks to join NJ's suit against congestion pricing - Click Here

School pandemic dollars wasted on tech? - Click Here

Laws waived for border wall construction - Click Here

AI could help firefighters - Click Here

Hyundai, Kia electric vehicles using Tesla ports - Click Here

US will admit more refugees from Latin America, Caribbean - Click Here

Google hikes price for new Pixel smartphones - Click Here

House in disarray after speaker chaos - Click Here

Toys R Us comeback? - Click Here

Apple to fix problems making iPhone 15s too hot - Check Here

Abortion, gun cases on high court docket - Click Here

Hackers breach 2 casinos in Vegas - Click Here

Google brings AI chatbot into inner circle - Click Here

Who will be the next speaker after McCarthy? - Click Here

Mental health cases for teens in NJ soar - Click Here

Garland says he'd resign if Biden tries to interfere in Trump cases - Click Here

Biden pleads not guilty to gun charges - Click Here

Hunter Biden sues Giuliani, other lawyers - Click Here

Ex-aide: Meadows burned documents in his office - Click Here

Lawyers: Prosecutors want to 'silence' Trump -Click Here

Amazon investing up to $4B in AI startup Anthropic - Click Here

Biden to create climate corps for US - Click Here

Airbnb says it's cracking down on fake listings - Click Here

Trump's shutdown stance clouds debate - Click Here

Ex-lawyer sues Giuliani, alleges $1.36M tab unpaid - Click Here

Impeachment inquiry hearing set in House - Click Here

Florida jury could give edge to Trump - Click Here

Hunter Biden sues IRS over tax disclosures after agent testimony - Click Here

Will SAVE college loan plan help student borrowers? - Click Here

Hate on the rise - Click Here

Averting a shutdown won't be easy on hill - Click Here

Congressional divide starker than ever - Click Here

DACA recipients are left in limbo - Click Here

AI is here - Will journalism ever be the same? - Click Here

TikTok's e-commerce shop launches in US - Click Here

Updated vaccine trio coming soon - Click Here

US approves updated COVID-19 vaccines - Click Here

Should kids get the newly approved COVID booster? - Click Here

ALS patients in NJ cheer iPhone's new voice banking accessibility feature - Click Here

Georgia prosecutors urge one trial for Trump, 18 others - Click Here

Trump won't be tried with attorneys - Click Here

NJ mother taking on Trump, guns and book bans - Click Here

Hunter Biden indicted on federal firearms charges - Click Here

Challenges loom as House returns - Click Here

Smucker to buy Hostess in $5.6B cash/stock deal - Click Here

Consumers should watch out for these new IRS scams - Click Here

COVID-19 side effect - Parents are flexing their power at kids' schools - Click Here

Judge approves Party City's plans to stay afloat - Click Here

RU makes breakthrough in a no-shot vaccination - Click Here

Watchdog describes border wall harm - Click Here

Trump Organization offloads golf course in Bronx - Click Here

McCarthy: Open impeachment inquiry - Click Here

Trump seeks recusal of election case judge - Click Here

Study: HPV shots cut risk of STI, cancer for years - Click Here

Rite Aid said to be filing for Chapter 11 - Click Here

Walmart shopping carts draw complaints Click Here

Congress will try to avert government shutdown - Click Here

Former chief of staff pleads not guilty in Georgia election case - Click Here

Capitol doctor gives McConnell assessment Click Here

Power of attorney a way to help college kids - Click Here

Democrats: IRS free tax filing under fire - Click Here

Cash bail meant to deter wrongdoing - Click Here

Unique academy and educational tracks in schools - Click Here

Google reaches deal in app store lawsuit - Click Here

EPA delays new ozone standards - Click Here

Smith: Trump's comments risk tainting DC jury pool - Click Here

Trump and Hunter Biden are train wrecks - Click Here

Trump's Trials - Click Here

Trump trial in federal election case set for March [2024] - Click Here

Trump denies inflating net worth - Click Here

Trump pleads not guilty in Georgia election case - Click Here

Trump continues drumbeat of election lies - Click Here

Biden is 'old,' Trump is 'corrupt' - Click Here

US, China agree to launch talks on export controls - Click Here

How to prepare kids for flu, COVID and RSV - Click Here

FDA issues warning letters to three infant formula makers - Click Here

Amazon CEO warns employees of return to office - Click Here

Georgia jail where Trump will be booked is problematic - Click Here

Prosecutors say witness retracted false testimony - Click Here

Giuliani turns himself in on Georgia election charges - Click Here

Trump to surrender at Georgia jail - Click Here

Officials warn of scams targeting Maui donations - Click Here

Hawaii vows to protect local landowners - Click Here

Study: Arthritis drug could boost morning-after pill - Click Here

Colleges seek to 'ChateGPT-proof' assignments - Click Here

Involving parents in schools is good for NJ - Click Here

Sopranos were better at evading RICO than the Donald - Click Here

Trump, allies repeat election lies - Click Here

Fake reviews could face fines - Click Here

Everyone can save for retirement with Roth IRAs - Click Here

Amount down, but spotted lanterflies are still around - Click Here - New Jersey

The next federal debt crisis is looming - Click Here

Elite colleges face scrutiny over legacy admissions - Click Here

Voters many grow tired of trump's trails - Click Here

Alzheimer's drug often not covered - Click Here

Costly airline phone scam is clipping travelers' wings - Click Here

Amazon warns of new Online shopping scams - Click Here

QR code scams can prove very costly to victims - Click Here

Lawsuits against real estate influencers climb to 11 - Click Here

Poll: US divided over Trump cases - Click Here

Prosecutors say Biden gun charges deal dead - Click Here

Georgia case's size an issue for both sides - Click Here

Trump assails election case judge - Click Here

Court site publishes, removes, Trump charges - Click Here

Trump and 18 Allies charged - Click Here

Indictment may be Trump's biggest - Click Here

How RICO law affects Trump case - Click Here

UBS settles 2007 mortgage fraud lawsuit - Click Here

For Treads, the real rival remains TikTok - Click Here

Hunter Biden's lawyers: Part of peal deal still valid - Click Here

Prices soar for Medicare drugs - Click Here

DC National Guard shakeup coming - Click Here

Can the First Amendment bend? - Click Here

Offshore wind would hurt ordinary people - Click Here

Is AI's hallucination problem fixable? - Click Here

DOJ facing biggest test in its history - Click Here

Ex-NYPD head meets with Jack smith's team - Click Here

WeWork not sure it can stay in business - Click Here

Zoom wants its workers back in office part time - Click Here

What to know before renting an apartment - Click Here

New Jersey commissions will study social media's impact on children - Click Here

Passaic County surrogate's make-a-will events reach hundreds of residents - Click Here

Malloy's parents, district settle suit for $9.1M - Click Here in New Jersey

What's next in Hunter Biden case? - Click Here

Hunter Biden's former business partner testifies - Click Here

Amazon offering video telemedicine nationwide - Click Here

Trump threatens House Republicans - Click Here

Prolific lies - Click Here - New Jersey

Blind Spots - Click Here - New Jersey

Will newest charges change minds of Trump's supporters? - Click Here

Prosecutors may be seeking quick trial - Click Here

Lawyers hints at 1st Amendment defense - Click Here

Trump backers react to charges - Click Here

2024 could mean presidency or prison - Click Here

Pence crucial in Trump indictment - Click Here

Indictment details fake electors scheme - Click Here

More legal trouble for local real estate influencers - Click Here

Many remain loyal to Trump despite latest legal issues - Click Here

Trump's alleged co-conspirotors pose threat if they flip - Click Here

Many January 6 [2021] defendants plead guilty - Click Here

Biden looks to provide heat relief - Click Here - heat.gov

Automakers to build EV charging network - Click Here

Trump says his lawyers met with prosecutors - Click Here

When hackers get your email, they can do financial damage - Click Here

Ground beef from NJ ShopRites is linked to salmonella - Click Here

Ways to stay cool in North Jersey amid looming heat wave - Click Here

Hunter Biden pleads not guilty to 2 tax crimes - Click Here

Giuliani concedes he made false statements - Click Here

Study: Climate change fuels July heat - Click Here

A plea for help - from 911 employees - Click Here

Proposal would boost mental health care - Click Here

To what degree will voters care about climate? Click Here

Funding, compassion must drive opioid fight - Click Here

Musk reveals 'X' logo to replace Twitter's blue bird - Click Here

Amazon asks some corporate workers to relocate - Click Here

Child tax credit could be made permanent - Click Here

White House launches cybersecurity labeling - Click Here

Influencer face allegations of fraud - Click Here

Convicted Ponzi schemer faces new chargers - Click Here

Trump facing mounting legal woes - Click Here

Target letter hings inquiry is zeroing in on Trump - Click Here

AI for rents: This chatbot has answers for those new to the market - Click Here

Judge upholds $5M jury verdict against Trump - Click Here

White House takes on corporate merger, more - Click Here

Want to be a social media authority? FDU starts new program - Click Here

Debate over definition of antisemitism hits home - Click Here

Trump says he's a target of 2020 election investigation - Click Here

NJ has among the most personal injury lawsuits in the country - Click Here

Can you recycle pizza boxes? Click Here

Dos and Don't as a college grad moving home - Click Here

Lawsuit seeks to end terror watch-list - Click Here

Judge to take stage in Trump case - Click Here

Second Alzheimer's drug can help slow progression - Click Here

Poll: Many pessimistic about democracy - Click Here

Why the GOP is losing Gen Z - Click Here

Updated criteria for new FBI HQ site announced - Click Here

Many in US working less than pre-COVID - Click Here

FTC's sting aims to stop Online crooks - Click Here

Rutgers governor [NJ] vote to merge 2 medical schools - Click Here

Poll: Few Back full abortion bans - Click Here

Director defends FBI against GOP criticism - Click Here

FDC OKs over-the-counter birth control - Click Here

Ex-Trump supporter sues Fox News for defamation - Click Here

Senators call for justices to follow ethics code - Click Here

Trump lawyers ask judge to postpone Florida trial - Click Here

Trump talks indictments, election as he promotes NJ golf event - Click Here

Valet pleads not guilty in classified documents case - Click Here

Latest tax scam promises help with refund - Click Here

Army major from NJ charged with defrauding Gold Star families - Click Here

Asian Americans Feel targeted by law - Click Here

New pay for NYC app-based food delivery workers delayed - Click Here

Special counsel's Trump probes cost more than $9M - Click Here

Guess who could be coming with your dinner - Click Here

Costco cracks down on membership card sharing - Click Here

GM Energy's new products can help power your home - Click Here

Meta takes aim at Twitter as Threads makes debut - Click Here

Parts of warrant affidavit unsealed in Trump case - Click Here

Trump valet pleads not guilty in documents case - Click Here

Pentagon plans tighter controls on classified info - Click Here

Pentagon tightening security after docs leak - Click Here

World's first flying car gets approval - Click Here

Twitter users, advertisers react to platform changes - Click Here

Power problems reported in Hyundai SUV - Click Here

Ruling says race cannot be factor in college admissions - Click Here - 06/29/2023

Supreme Court denies Biden's Student Loan Forgiveness - Click Here - 06/30/2023

Sherrill bill promotes tutoring to address pandemic learning loss - Click Here

CDC reprots 1st US spread of malaria in 20 eyars - Click Here

US regulators target bogus Online reviews - Click Here

Climate change effects getting worse - Click Here

Tips to make a computer run more smooth - Click Here

FDA OK s IV gene therapy to treat severe hemophilia - Click Here

Poll: Trump's GOP support dips - Click Here

Court rejects novel legislative theory - Click Here

Big Tech layoffs give other sectors an opening - Click Here

Watchdog alleges theft of COVID aid - Click Here

Supreme Court dismisses Trump hotel lease lawsuit - Click Here

Ford EV battery plants to get sizable loans - Click Here

5 things to know about plan to cut taxes for NJ seniors - Click Here

Microsoft confirms attacks on servers - Click Here

About 1.5 million lose Million lose Medicaid - Click Here

Booker touts measure to protect LGBTQ+ people from discrimination - Click Here

Energy CEO wants to build a better battery - Click Here

Amazon's once-reliable cloud business slows Click Here

Here's why ' filed lawsuit against Google - Click Here

Use tech to reduce summer brain drain on kids - Click Here

Capitol rioter given 14 days of jail time - Click Here

Students feel 'unsupported' at colleges as antisemitic crime rises - Click Here

'Fighting with love' - Click Here

Cybersecurity company details big Chinese hack - Click Here

Organization: ;GBTQ+ amercements under attack - Click Here

Supreme Court to hear Trump trademark case - Click Here

SEC lawsuits show unease with crypto - Click Here

'But most of all I'm human' - Click Here

Dems frustrated by food aid changes - Click Here

Trump hearing likely to be spectacle - Click Here

Trump escalates attack on case - Click Here

Former president pleads not guilty to 37 counts - Click Here

Shadow of Nixon hovers over another ex-president's retreat to NJ - Click Here

Trump tees off in golf club speech - Click Here

Former president calls charges 'fake' in return to New Jersey - Click Here

How much prison could Trump face? Click Here

Is Trump's obsession with revenge a viable political strategy! - Click Here

New round of Trump 'truth or dare' after indictment - Click Here

GOP rallying cry: 'Stand with Trump' - Click Here

Trump trial in documents case scheduled for August 14 [2023] - Click Here

Florida court date for Trump's valet postponed - Click Here

Biden's son to plead guilty in tax case - Click Here

Dems downplay Hunter Biden's deal - Click Here

Report says Alito accepted vacation from GOP donors - Click Here

Company says it can't ensure safety of air bags - Click Here

FTC: Amazon enrolled users into Prime without consent - Click Here

Cases of check fraud escalate dramatically - Click Here

COVID-19 made one thing clear - Click Here

Windows Copilot lands AI capability on your PC - Click Here

Are right-wing attacks on press protections really just attacks on democracy? - Click Here

Why do the feds care about Trump's ties to LIV Golf? - Click Here

Shared concern - Click Here

Trump's legal team, prosecutors spar - Click Here

Ex-Santos aide says he got his job through payments - Click Here

FBI director Wray may be held in contempt of Congress - Click Here

3 signs you may need a credit card hiatus - Click Here

If your child is a bully, psychologist says gently find out why - Click Here - StopBullying.gov

New law allows NJ drivers with autism to not it on licenses - Click Here

Free steering-wheel locks in NJ for Kia, Hyundai models at risk from TicTok - Click Here

NJ boosts telehealth counseling services - Click Here

US coming after January 6 rioters' haul - Click Here

Mar-a-Lago probe shows signs of winding down - Click Here

Poll: Biden weak on economy, guns - Click Here

Postal workers conned by cyber scam are irate - Click Here

FDA approves nasal spray to reverse opioid overdoses - Click Here

Lawmakers seek to put AM radios in every vehicle - Click Here

Suits vs. gun industry face hurdles - Click Here

Vice Media files for Chapter 11 bankruptcy - Click Here

Durham: FBI's Trump-Russia probe flawed - Click Here

Twitter's account purge includes deceased users - Click Here

Durham report details 'flawed' probe - Click Here

Case involving abortion pill moves to appeals court - Click Here

Not enough progress made to curb inflation - Click Here

Proud Boys' Tarrio guilty of conspiracy Click Here

Source says Biden would veto GOP migrant bill - Click Here

Trump digs in on election untruths - Click Here

What's replacing Bed Bath & Beyond? - Click Here

Bed Bath & Beyond to pay severance to 1,300 workers - Click Here

Alleged leaders of multi-state car theft ring indicted in federal court - Click Here

Senators seek to protect kids Online Click Here

Feds: Abortion denial in emergency illegal - Click Here

New Jersey's MVC starts offering vehicle registration display on digital platforms - Click Here

Garden State Plaza implements chaperon rule - Click Here - New Jersey

Surveillance law's future unclear - Click Here

Group calling for end to watch-list - Click Here

US, Mexico agree on tighter border policies - Click Here

Don't learn the hard way: Common items can prove deadly for your dog - Click Here

House votes to restore solar tariffs - Click Here

Ocean temps shockingly high, experts say - Click Here

Liquidation sales for Union-based retailer set to start Wednesday - Click Here 04/26/2023

Bed Bath & Beyond bankruptcy saddens shoppers - Click Here

GM, Samsung plan new EV battery cell factory in US - Click Here

Appeals court says Pence can testify - Click Here

Immigrants are easing worker shortage - Click Here

Biden: 'We're making real progress' - Click Here

Census considers ending question about ancestry - Click Here

US officials seek to crack down on harmful AI products - Click Here

Firearm detections on the rise in airports - Click Here

Lawyer: Proud Boys leader is scapegoat - Click Here

We must protect the First Amendment from threats - Click Here

Commonsense fixes to gun violence in US - Click Here

Fox parts ways with Carlson - Click Here

Fox hosts avoid Carlson's name after his ouster - Click Here

Settlement by Fox casts shadow - Click Here

House passes trans athlete ban for girls; women's teams Click Here

Supreme court won't block $6B debt relief settlement - Click Here

Menendez urges fix for State Department's passport delays - Click Here

Appeals court halts GOP questioning of Pomerantz - Click Here

Poll: NY least of Trump's troubles - Click Here

High court holds off on abortion pill ruling - Click Here

Judge: House GOP can question ex-prosecutor - Click Here

2 accused as secret Chinese police in NY - Click Here

Trump forum a test for CNN, Collins - Click Here

Anti-abortion group aligns with Trump - Click Here

China says US claims of police"groundless' - Click Here

Biden signs order to boost child care access - Click Here

Tax breaks lure clean tech companies to US - Click Here

Abortion pill federal court rulings muddy the debate - Click Here

Plan aims to protect abortion patients' records - Click Here

DOJ to ask for hold on abortion pill barriers - Click Here

Morning-after-style pill seen as tool to fight rising STDs. -Click Here

Lessons from NJ Proud Boy's January 6 [2021] sentencing - Click Here

No driver? No problem - Click Here

Test detects Parkinson's before symptoms appear - Click Here

Abortion bans raise fear in GOP - Click Here

Top 5 skills to Highlight on Your Resume - Click Here

Great part-time jobs for retirees - Click Here

Resources for care of homeless seniors lacking - Click Here - New Jersey

At-home care options for seniors in NJ - Click Here

Where the Heart Is - Click Here

Some tips on fighting elder fraud - Click Here

Technological difficulties - Click Here - NJIT

Keeping in touch - Click Here

Democracy at stake' in Trump investigations - Click Here

Mug shot as a political boost? Some have tried - Click Here

Tsunami of legal challenges expected - Click Here

'First matter: Trump arrest is a political earthquake - Click Here

Trump's legal issues present never-asked questions to ponder - Click Here

Former prosecutor in Trump case subpoenaed - Click Here

After arrest, Trump revives election lies - Click Here

Barr: DOJ could have 'very good evidence' - Click Here

Bragg sues House leader over inquiry - Click Here

Ex-president answering question in fraud lawsuit - Click Here

TikTok scrutinizing continues - Click Here

Some in Congress defending TikTok - Click Here

Congress confronts limits of gun law - Click Here

Medicare, Social Security could fall short, report says - Click Here

House GOP OKs bill to unleash' energy - Click Here

GOP lawmakers accuse Fed of being lax before bank failure - Click Here

Starbucks CEO defends his union stance before Senate - Click Here

Deadly 'superbug' fungus is spreading CDC warns - Click Here

Possible deadly fungus spreading - Click Here

WeightWatchers set to add anti-obesity medication - Click Here

NJ DMV working to help drivers obtain Real ID - Click Here - REALID.nj.gov

Parents needs a digital-age reboot, say some New Jersey mental health doctors - Click Here

Potential TikTok ban stirs up passions among users - Click Here

Fix red flags that could result in audit - Click Here

Tips on how to care for an older relative from afar - Click Here

Can Solar Farms produce food, too? - Click Here

5 tips on Negotiating Your New Job Salary - Click Here

TikTok CEO faces off with Congress - Click Here

8 tips on How You Can Prioritize Finding The Right Job in 2023 - Click Here

8 Illegal Job Interview Questions And How to Handle Them - Click Here

How to help older NJ drivers decide to give up the car keys - Click Here - New Jersey

Prosecutors rest in Proud Boys trial - Click Here

Data: Women outnumbered as execs - Click Here

Why aren't we giving teens real mental health help? - Click Here

More Americans dying in childhood - Click Here

EPA to limit 'forever chemicals' in water - Click Here

Call and Response - Click Here - In New Jersey

Long-used abortion pill is under threat - Click Here

EV charging network gets $2.5B add equity - Click Here

Panel subpoenas files of Hunter Biden's associates - Click Here

Banks are safe, Biden assures US - Click Here

'Forgotten Middle' - Click Here

Is there a federal inheritance tax? - Click Here

Congress health data breach creates huge risks - Click Here

Sicknick family blasts Fox News' Carlson - Click Here

Attacks, investigations test FBI - Click Here

Hicks meets with NY prosecutors - Click Here

China officials decries US policy - Click Here

Now is the time to squash spotted lanternfly eggs - Click Here

Navigating world of elder care can be overwhelming - Click Here

Nations reach accord to protect marine life on high seas - Click Here

Race on to boost EV range in cold - Click Here

Justice Department says police can sue Trump over January 6 - Click Here

Spotting fatigue early can be key to recovery from long COVID - Click Here

TikTok sets new default time limits for minors - Click Here

IMPORTANT: Landlords warned about bias toward ex-inmates - Click Here in New Jersey

China dismisses FBI statement on COVID-19 lab leak theory - Click Here

Justices put student loan forgiveness to test - Click Here

Biden warns of GOP's plans for health care cuts - Click Here

Take these steps to plan long-term care for an elderly relative - Click Here - New Jersey

NJ consumers lost $231 million to fraud last year, [2022] FTC reports says - Click Here

Should you Use Recruiter/Staffing agencies in a Job Search? - Click Here

Teen depression focus of state bill [NJ] - Click Here

Jewish community vigilant as group pushes 'hate' - Click Here

Extremism-linked mass killings have spiked - Click Here

Those who want jobs in New Jersey's cannabis field can start with course - Click Here

Morris district alleges social media harm to students - Click Here - New Jersey

Release of January 6 footage decried - Chick Here

Make your credit cards less vulnerable to fraud - Click Here

Record 6,542 guns intercepted at airports - Click Here

TikTok ban proposed amid tensions with China - Click Here

Sherrill resumes drive for bipartisan auto-theft bill - Click Here

Why are mass shootings the new normal? - Click Here

How AI will change future of health care - Click Here

Choosing the Best Reference for Your Job Application - Click Here

Seeking a change in US census reporting - Click Here

What company changes mean for your home loan - Click Here

Turmoil in courts on gun laws after court's ruling - Click Here

Panel backs moving Narcan over the counter - Click Here

DOJ giving states $231M for gun violence prevention programs - Click Here

White House: Tesla to make EV chargers available to all - Click Here

Low on cash? give these tech freebies a try - Click Here

Tips on Choosing the Best References - Click Here

Company CardBro makes sending greeting cards easy - Click Here

Why many are choosing Medicare Advantage - Click Here

NJ residents need to set preparedness plans - Click Here

FBI looking into NJ veteran's claims against Santos - Click Here

IMPORTANT: The Supreme Court in a 5-3-1 vote overturn Roe v. Waye at 10 AM.!!

China conducted spy balloon work for years, Pentagon says - Click Here

US: Balloon set up to collect lintel - Click Here

6 Chinese entities restricted by US - Click Here

Is tipping getting out of Control? - Click Here

Yes you do need to go back to the office - Click Here

Bills seeks to protect seniors, people with disabilities from scammers - Click Here

Clinton back at WH to push paid leave - Click Here

GOP-led panel targets COVID-19 aid for review - Click Here

WHO chief: COVID-19 nears inflection point - Click Here

12 NJ mayors call for offshore wind pause - Click Here

A Quick, comprehensive Guide to Employee Engagement - Click Here

New idea: Brining your infant to work - Click Here

Want fewer shootings" Pass tougher gun laws - Click Here

5 Tips on Negotiating Your New Job Salary - Click Here

Asian Americans discuss what it's like to live in US, New Jersey - Click Here

Need a US passport? Here's what to know - Click Here - www.us.gov/passport

Crypto firms acted like banks, then collapsed - Click Here

Lawmakers make move on insurrectionists - Click Here

4 Oath Keepers convicted of seditious conspiracy - Click Here

Senators blast Ticketmaster 'mess' after Taylor Swift fiasco - Click Here

US proposes once-a-year-COVID-19 vaccination booster shots - Click Here

Biden's next task: Enticing Americans to buy green - Click Here

Amazon adding new drug program to its offerings - Click Here

Tax the rich? Liberals renew push for state wealth taxes - Click Here

Prosecutor: Oath Keepers saw January 6 riot as triumph - Click Here

Party City, based in North Jersey files for Chapter 11 - Click Here

Explosive, Flammable, Carcinogenic - Click Here

Dangerously close to home - Click Here

Drilling for worst disasters imagined - Click Here

Pause sought in wind farm plan - Click Here

From Brink of Disaster - Click Here

NJ's industrial history peppered by chemicals disasters - Click Here

Booker calls on EPA to strengthen chemical safety rules - Click Here ]

Groups: 'No evidence' offshore wind killed whales - Click Here

Strategies to improve your ability to focus - Click Here

Speaking from experience - Click Here

How to pay transparency may affect your job search or raise - Click Here

Garland initiates Biden probe - Click Here

Idaho stabbing suspect to face hearing in June - Click Here

Proud Boys sedition trial opens two year after January 6 [2021] - Click Here

Biden inspects busy Texas crossing - Click Here

Mexico may accept more expelled migrants - Click Here

GOP pushes anti-abortion measures in US House - Click Here

Justices: NY can enforce gun law during lawsuit - Click Here

Schools sue tech giants over social media harm - Click Here

A new side of gaming - Click Here

Drug that slows down Alzheimer's hits market - Click Here

US appeals court blocks ban on rapid-fire 'bump stocks' - Click Here

Marijuana addition is a real thing, and here's what NJ should know - Click Here

Flu, COVID, RSV bring child care disruptions - Click Here

FTC proposes new rule that would prevent employers from imposing non-compete clauses - Click Here

Slaying suspect to be extradited - Click Here

FTX founder Bankman-Fried pleads not guilty to fraud charges - Click Here

Brian's Legacy - Click Here

FTX's collapse mirrors 18th-century scandal -Click Here

This former Trump aide from NJ set an example the GOP should embrace - Click Here

Court keeps immigration limits in place indefinitely - Click Here

No-nonsense judge takes over Bankman-Fried case - Click Here

RV slump may be warning of recession - Click Here

Video game workers form Microsoft's first US labor union - Click Here

6 ways to make extra money in retirement - Click Here

Microsoft to fight over $68.7B video game deal - Click Here

SEC says it's not violating Musk's free speech right, but doing its mandate - Click Here

US court rejects maintaining Title 42 - Click Here

Court pauses Biden effort to end Title 42 immigration policy - Click Here

FBI Online 'sextortion' of teen boys is soaring - Click Here

Migrants wait for US to lift limits - Click Here

Congress moves to ban TikTok from US government devices - Click Here

Crypto's ties to sports raise ethical questions - Click Here

Anti-LGBTQ rhetoric Online spurs fears - Click Here

Real ID deadlines pushed back 2 years to May 2025 - Click Here

Buyers Beware - Click Here - SaferProducts.go

Amtrak unveils newest trains - Click Here

More migrants released to come as restrictions end - Click Here

Biden renews call for assault weapons ban - Click Here

How to ask for what you want before taking a job - Click Here

Biden signs bill to protect same-sex marriage - Click Here

Former FTX CEO hit with 8-count indictment - Click Here

Merk, Moderna say vaccine for skin cancer shows progress - Click Here

Will your remote job stay that way? - Click Here

Real estate scams on rise - Click Here

Biden restarts task force on immigrants - Click Here

Biden signs law limiting use of nondisclosure deals - Click Here

Justices to hear major immigration case - Click Here

Justices weigh deportation policy - Click Here

White House tackles antisemitism at forum - Click Here

Stakes are high in gay rights Supreme Court case - Click Here

Supreme Court weights 'most important' case on democracy - Click Here

High court justices hear religious rights case - Click Here

Protecting abortion access hits roadblocks - Click Here

Meta board urges changes to VIP system - Click Here

Study: US gun death rates hit highest levels in decades - Click Here

Experimental drug appears to slow Alzheimer's - Click Here

Chinese Americans keeping close eye on unrest - Click Here

Stopping the chain reaction of gun violence - Click Here

How often do mass killings happen at work - Click Here

States move to keep court from lifting Trump asylum policy - Click Here

This is the most important question you'll get asked in a job interview - Click Here

Judge orders Amazon to stop retaliations against organizers - Click Here

HBCU files complaint, seeks review of bus search - Click Here

New legislation puts greater restrictions on toy guns in NY - Click Here

COP27 concludes with no progress on emission cuts - Click Here

In UN climate deal, cash, no emission cuts - Click Here

Jack Daniel's asks justices to hear dog toy dispute - Click Here

'Zombie Debt' Catches homeowners off guard - Click Here

Same-sex marriage bill clears key Senate hurdle - Click Here

Stakes are high in gay rights Supreme Court case - Click Here

Airbnb aims to convince more people to rent out their homes - Click Here

Biden's student loan plan blocked again - Click Here

Pearl River's Pfizer site leads on RSV vaccine work - Click Here

40 states settle Google location-tracking charges - Click Here

Walmart offers to pay $3.1B to end opioid lawsuits - Click Here

Supreme Court rejects hearing another bump stock ban case - Click Here

Supreme Court's election case is test of public trust - and democracy - Click Here

World's shipping industry changed overnight - starting in Jersey - Click Here

Tesla robot walks, waves but doesn't show off complex tasks - Click Here

Climate woes bad and getting worse faster - Click Here

Vonage hit with penalty over cancellations - Click Here

Medicare enrollees warned about schemes - Click Here

Secret language helps child predators avoid detection - Click Here

Homebuyers suddenly calling the shots - Click Here

FBI warns of 'broad threat' to synagogues - Click Here

CDC softens guidelines for prescribing opioids - Click Here

CVS, Walgreens announce opioid settlements of $10B - Click Here

Penn Station remodeling project debate lands in court - Click Here

Why might live election results fluctuate in US? - Click Here

Justice take up affirmative action cases - Click Here

Move aside, BA.5: New variants are gaining ground - Click Here

Fraud, scam cases increasing on Zelle, Senate report finds - Click Here

Chinese officers changed in plot to obstruct US Huawei probe - Click Here

Later in life,lack of sleep may pose risk to health, study says - Click Here

Climate change is not a new concern - Click Here

EPA awarding nearly $1B for electric school buses - Click Here

Judge let's New York's new gun laws remain temporarily - Click Here

NY AG moves for court oversight of Trump Organization - Click Here

Delta invests $60M in air taxi developer - Click Here

Judge halts key parts of NY's new gun law - Click Here

White House unveils guidelines, plan for AI equity - Click Here

Global database of fossil fuels launched - Click Here

STD rises spurs calls for changes - Click Here

The 'Google' of Gen Z - Click Here

'Credit invisibles' about to be seen - Click Here

Biden pledges to make federal fleet electric faces slow start - Click Here

Sparking changes: Plans for EV stations approved - Click Here

Special master signals quick reviews - Click Here

House OKs election law overhaul - Click Here

Here's how claiming 'unclaimed property' really paid off for me - Click Here

Calls to suicide prevention hotline rise after move to 988 number Click Here

4 non-investment question to ask an adviser before retiring - Click Here

Activists raise alarms about 988 suicide hot-line - Click Here

GOP's Graham seeks federal abortion ban - Click Here

3 charged in broad hacking campaign - Click Here

Biden signs 'burn pit" aid for vets - Click Here

4 things to know about working past age 65 - Click Here

Congress has ways to keep secrets safe - Click Here

Inflation is changing job search - Click Here

Spotted lanternfly questions answers - Click Here - New Jersey

Biden signs executive order to protect travel for abortion - Click Here

Senate OKs aid for vets exposed to burn pits - Click Here

CVS to buy home-health provider Signify for $8B - Click Here

Juul to pay nearly $440M to settle states' teen vaping probe - Click Here

Test of first possible Lyme vaccine in 20 years begins - Click Here

New Online dashboard helps flyers with delays, cancellations - Click Here

Bannon expects new criminal charges in NY - Click Here

Bannon faces money laundering, fraud charges - Click Here

GM's next EV aims at mainstream buyers - Click Here

ALS drug gets second review at FDA meeting - Click Here

China accuses Washington of cyberspying on university that does military research - Click Here

These 9 tips help make more money in your small business - Click Here

Even mile COVID cases can result in symptoms that persist, study finds - Click Here

New minimum? Job seekers increasingly demand $20 an hour - Click Here

FDA chief: Long-awaited opioid review continues - Click Here

New York to restrict gun carrying - Click Here

LG, Honda to set up US joint venture to make EV batteries - Click Here

Just starting out? Learn from our mistakes - Click Here

Drugmaker Teva latest to settle opioid lawsuits nationally - Click Here

Health news has some brains too clogged to think - Click Here

FTC looking at rules to corral tech firms' data collection - Click Here

Court undermines efforts to deter violence - Click Here

AR-15-style guns bring in over $1 billion over last decade - Click Here

Gun violence research takes off across US - Click Here

Polio outburst reveals rare risk of oral vaccine - Click Here

In poll, 2 in 3 favor term limits for Supreme Court - Click Here

Biden signs $280B CHIPS act in bid to boost US over China - Click Here

Climate, health bill a Biden win - Click Here

Video games normalize violence - Click Here

Biden announces modest climate actions, pledges more to come - Click Here

Social media influencers change how you dine out - Click Here

Many question value of college in America - Click Here

House OKs bill to protect contraception - Click Here

AP-NORC poll: Majority in US want legal abortion - Click Here

Experts warn domestic violence is major concern - Click Here

House passes same-sex marriage bill - Click Here

Battle lines from over drug price curbs - Click Here

4 the future? - Click Here

Study: rich nations caused climate harm to poorer ones - Click Here

Docs 'must offer abortion if mother's life at risk - Click Here

BA.5 makes up majority of state's COVID cases - Click Here - www.covid.gov/tests

LGBTQ hate abounds on social media, report says - Click Here

Democrats stress security as computer chips bill stalls - Click Here

Biden celebrates of new gun law clouded - Click Here

FDA to weigh birth control sold without prescriptions - Click Here

House panel looking into extremist ties - Click Here

'Buy now, pay later? One missed payment could mean costly debt - Click Here

The Internet could help or hurt women who are seeking abortion - Click Here

Women of color will be impacted by Roe ruling - Click Here

Courts move puts Senate back in play - Click Here

Abortion ban could affect OB-GYN training - Click Here

High court's abortion ruling sets off new court fights - Click Here

Supreme Court sides with coach who sought to pray after game - Click Here

Poll: Many won't rely on virtual options in future - Click Here

Judge's ruling favors opioid distributors - Click Here

Adoption is not a panacea - Click Here

Biden signs landmarked gun bill - Click Here

Gun ruling could right racial wrong - Click Here

Join our pledge to Democracy - Click Here - www.teamdemocracy.org

'Chaos of emotions' fills Capitol after historic rulings - Click Here

'Let My People in' - Click Here

US to issue monkeypox vaccine as NJ reports 4 probable cases - Click Here

FDA bans Juul vaping products - Click Here

Supreme Court strikes New York gun law - Click Here

Bipartisan gun bill on road to passage - Click Here

NOTICE: The Supreme Court struck down New York State Strict Gun Laws

Senators Compromise on gun bill - Click Here

Dining changes: Restaurants say robot waiters to stay - Click Here

Justices: Religious schools can get aid - Click Here

Internet Explorer finally sent to dustbin of software history - Click Here

Body armor rules miss vest worn by alleged NY shooter - Click Here

Supreme Court rejects Bayer bid to stop Roundup lawsuits - Click Here

Kellogg to split into 3 separate companies - Click Here

Governors form task force to address mass shootings - Click Here

Panel releases video supporting Sherrill's claim - Click Here

Judge: New York's lawsuit against NRA can move forward - Click Here

Police: Capitol tour on January 5, 2021, wasn't suspicious - Click Here

Court rejects Trump-era finding weed killer is safe - Click Here

House OKs security boost for justices and families - Click Here

Group of senators makes deal on gun legislation - Click Here

Don't let your first car be a $30K mistake - Click Here

House approves 'red flag' gun bill, but its fate is dim - Click Here

No, you're not imagining it - package sizes are shrinking - Click Here

Activists say cyber agency weakens voting tech advisory - Click Here

Wray: FBI blocked cyberattack on children's hospital - Click Here

US sees heightened threat of domestic extremism - Click Here

Senator seek broad oversight of crypto - Click Here

Some cancer patients can skip treatment, 2 studies show - Click Here

Proud Boys documentarian to be among January 6 witnesses - Click Here

Warning signs can show potential mass shooter - Click Here

Canada to cap handgun market with a new law - Click Here

Axon halts plans for Taser-equipped drone - Click Here

Biden appeals for tougher gun laws - Click Here

Putin-linked elites, yachts, aircraft and firms targeted for new sanctions - Click Here

Shooting victims testify before Congress - Click Here

Will Congress now act on guns? - Click Here

Senate GOP blocks terrorism bill - Click Here

Gunfire at schools at record high in US, research shows - Click Here

Biden signs new policing order - Click Here

Massacre extends Texas' grim run of shootings - Click Here

Protect unborn but don't help poor - this is valuable life? - Click Here

I'm the mom I an because I chose an abortion at 19 - Click Here

House pases domestic terrorism bill - Click Here

Advertising may be rough for social media - Click Here

Hepatitis cases in US, Canada could be linked to strawberries - Click Here

Biden see change for gun limits - Click Here

Biden seeks to boost solar panel production in the US - Click Here

Meta to reveal how its sites' ads target users - Click Here

House passes gas 'price gouging' bill - Click Here

How to avoid crypto 'rug pulls' - Click Here

Congress seeks to help computer chip industry - Click Here

Internet provider join Biden's discount plan - Click Here

Women's health bill failed in Senate - Click Here

Face-scanner Clearview agrees to limits in court settlement - Click Here

Why Asian women are shut out of leadership at American's top companies - Click Here

Social platforms too slow to pull shooting videos? - Click Here

What does 'community policing' even mean? - Click Here

Kick-start your Online clothing resale gig - Click Here

8 steps to break the credit card debt cycle - Click Here

Court emphasizes preliminary opinion is not the final word - Click Here

Rare leak comes in a case of the highest magnitude - Click Here

Anti-abortion groups look ahead to further moves - Click Here

Highly contagious avian flu kills millions of birds - Click Here

Justices tackle high school prayer case - Click Here

Biden makes lynching a federal hate crime - Click Here

Biden expected to release rule on ghost guns in days - Click Here

Biden rule takes aim at ghost guns - Click Here

Biden suspending 10% ethanol rule - Click Here Not Linked!!

Environmental advisers: Justice40 action needed - Click Here

HUD works to remove barriers to housing - Click Here

The Great Resignation not so great - Click Here

Confirmed - Click Here

Many US urban areas will become rural under new criteria - Click Here

Face scanner Clearview AI aims to branch out beyond police - Click Here

A financial checklist to quit your job - Click Here

Worker bring anxiety, question back to office - Click Here

Senate approves bill making daylight saving time permanent - Click Here

US has done away with time changes before - Click Here

After-school programs need staff - Click Here

Biden's China 'pivot' complicated by Russia - Click Here

House votes to further restrict Russian trade - Click Here

Poll: Americans doubt police reform - Click Here

Amazon's voice assistant Alexa to start seeking doctor help - Click Here

Congress OKs Postal Service overhaul - Click Here

Did Amazon violate laws? Lawmakers ask for probe - Click Here

Biden outlines plan, says it's time to return to normal - Click Here

Cyberattacks accompany Russian assault - Click Here

US ends asylum restrictions for children traveling alone - Click Here

Software automates hiring process - Click Here

Study: Human activity near rivers can worsen drought and flooding - Click Here

Uber is adding fuel fee to bills amid rising gas prices - Click Here

High court narrows reach of law on career criminals owning guns - Click Here

Congress passes Emmett Till bill to make lynching hate crime - Click Here

Supreme Court takes on clash over immigration rule - Click Here

FDA clears first smartphone app to deliver insulin doses - Click Here

Senators: CIA has data stash on Americans - Click Here

No-knick warrants face intense scrutiny - Click Here

Advocates cite chronic fatigue danger - Click Here

Over half of US abortions now done with pills - Click Here

Can marijuana really prevent COVID-19? various federal rules complicate research - Click Here

Gun control groups press Biden over ongoing deaths - Click Here

Proud Boys leader indicted in riot - Click Here

Texas suing Meta over sue of facial recognition - Click Here

Does vaccination status matter to singles? - Click Here

White House releases report bolstering unionization - Click Here

Hard thresholds dropped in new opioid guidance - Click Here

News Corp reports hack; link to China suspected - Click Here

Travel groups want to scrap testing requirements to enter US - Click Here

SAT exam going digital, cutting down test time - Click Here

How to start a one-person business - Click Here

White House scientist apologizes for behavior - Click Here

Have a seat - Click Here - located on route in North Brunswick NJ

EPA: New mail-delivery fleet needs more electric vehicles - Click Here

Senate panel advances step to curb tech giants' power - Click Here

Biden issues 'road map' for infrastructure goals - Click Here

States divided on abortion limits - Click Here

States weigh 'bounties' after abortion ruling - Click Here

Is working remotely an option for good? - Click Here

How to prepare for your Zoom interview - Click Here

How to start a one-person business - Click Here

Would you relocate for $10K? Should you? - Click Here

US to give teenage semi drivers a try - Click Here

High court to hear case of Christian flag in Boston - Click Here

Voting bill facing defeat from within - Click Here

For Oath Keepers and founder, January 6 was weeks in making - Click Here

Oath Keeper leader to remain jailed, judge order - Click Here

Dems pivot to fight for voting bills - Click Here

Rising cost hampering small businesses - Click Here

Biden team regroups after defeat in court - Click Here

New COVID variant no cause for alarm, experts say - Click Here

Artificial intelligence can help us avoid future power outages - Click Here

Get skills, not bills, with an unpaid internship - Click Here

New rules on lead in drinking water on way - Click Here

NSO Group spyware used to hack State employees - Click Here

Debate over adoption as alternative renewed - Click Here

Is your company secretly monitoring your work at home? - Click Here

Nissan investing in electric vehicles - Click Here

FTC and 23 states oppose hospital merger - Click Here

FDA: Merck COVID pill effective - Click Here

NYC aims to be 1st to rein in AI hiring tools - Click Here

Biden seeks balance on immigration - Click Here

Women left workforce; will they ever come back? - Click Here

Disability advocates demand reform - Click Here

DOJ continues court battles for voting rights - HOME

High court unlikely to add Puerto Rico to SSI program - Click Here

Democrats push for paid family leave - Click Here

Dems' social, climate bill passes House - Click Here

Microsoft: Russian-backed hackers targeting cloud services - Click Here

Cyberattacks are concerning to most Americans, poll finds - Click Here

Robots hit the streets as demand for food delivery grows - Click Here

Democrats confident methane fee will stay - Click Here

Data of over 40 million exposed in T-Mobile breach - Click Here

What to know about Indigenous Peoples' Day - Click Here

Justices side with police in excessive force cases - Click Here

FDA OKs first e-cigarette, cites benefit for smokers - Click Here

Apple delays plan to scan iPhones for abuse images - Click Here

Facebook puts development of Instagram for kids on hold - Click Here

How to help our daughters cope with toxic images on Instagram - Click Here

Facebook accused of hiding dangers - Click Here

Fixing Facebook - Click

Facebook failed to rid site of sex trafficking - Click Here

State attorneys general probing Instagram's effect on kids - Click Here

Supreme Court set to hear surveillance case - Click Here

Supreme Court allows evictions to resume - Click Here - to read more!

Fate of citizenship for 'Dreamers' rests with 1 - Click Here

Part-time - and no commitment - Click Here

Patriotism, Freedom - Click Here

Court: 18-year-olds can't be denied handguns - Click Here

Bill to protect judiciary back before Congress - Click Here

Judge orders end to DACA program - Click Here

Return on investments - Click Here

Software hack caused by China, US and allies say - Click Here

Chinese banks promise to step up cryptocurrency ban - Click Here

US gives asylum-seekers waiting in Mexico another shot - Click Here

Reason to celebrate - Click Here Juneteenth National holiday.

Leaders: China brings 'systemic challenges' - Click Here

High Court will not review men-only draft registration law - Click Here

Get serious on cybersecurity - Click Here

Many Americans want to keep teleworking - Click Here

Learning to adapt - Click Here

Biden signs latest anti-hate crime bill - Click Here

Streaming services want to stop password sharing -Click Here

Feds to study social media for conspiracies - Click Here

'Geek Squad' email scam targets seniors - Click Here

House passes sweeping voting rights bill - Click Here

3 things to know if you're new to gig work - Click Here

Monoclonal Miracle? - Click Here

Biden's team vows action against cyberhack as threats to the US persist - Click Here

How to spot fake Online shop sites - Click Here

Aid plan to end 'surprise' bills - Click Here

Who needs to commute? - Click Here

IMPORTANT: Administration must take new DACA applications - Click Here

It's time to secure your home network - Click Here

How to launch a business product and get some sales - Click Here

Google ad costs irks small businesses - Click Here

California court says Uber, Lyft drivers are employees - Click Here

5 industries you might consider for investments - Click Here

Dunkin' Donuts in talks to go private with Arby's owner - Click Here

Safe or Scary? - Click Here

IMPORTANT: US bans TikTok, WeChat from phone app stores - Click Here

Justice Department seeks immediate ban on WeChat downloads in the US - Click Here

LinkedIn looking more like Facebook - Click Here

Steroids confirmed to help virus patients - Click Here

Steps for becoming a work-at-home pro - Click Here

Can you trust your mobile payment app? - Click Here

T-Mobile revels new initiative to help block robocalls - Click Here

Facebook knocks Apple's app-store policies - Click Here

4 experts tips to get hired from home - Click Here

Clair's and Icing Websites Compromised to Steal Payment Data - Click Here

Scammers Use Recycled Extortion Tactics in New Campaign - Click Here

Online Shopping and Cyber security - Click Here

Can't find what you need on Amazon? - Click Here

Governor bobbleehads will support frontline workers - Click Here - store.bobbleheadhall.com

Smoking, Vaping could worsen virus symptoms - Click Here

Supreme Court upholds ban on robocalls - Click Here

Tax/Scams/Consumer Alerts - Click Here to read more information.

Personal Information of 5 million Marriott Customers Breached - Click Here

NJ gun law stands, as high court refuse appeal - Click Here

Public restrooms getting redesign - Click Here

GOP senators crafts bill that would put restrictions on use of chokeholds - Click Here

GOP bill would discourage chokeholds - Click Here

Dems: GOP police bill 'not salvageable,' demand talks - Click Here

Poll: Most want major police reforms - Click Here

Split Congress stalls on police reform plan - Click Here

LGBTQ workers get win in high court - Click Here

Quaker Oats retiring 131-year-old Aunt Jemima brand - Click Here

For grocery delivery, add extra fees to list - Click Here

Hyundia begins developing 'walking car' - Click Here