,

Crazy dangerous smart product hacks

A cardiac device from St. Jude’s Medical was found to have vulnerabilities that could allow a hacker to access the device. According to the FDA, once a hacker accessed the device, they could deplete the battery or even change pacing of the device. The compromised devices were meant to monitor and control heart functions. The …

,

Trevor Saved By His Flintlock Pistol

Trevor was in his early 20’s. He was attending a local community college and money was tight… But he loved to spend time outdoors, and he frequented a fishing spot on the banks of the Mississippi River. The particular area wasn’t great for hunting but was ideal for fishing. Trevor grew up around guns and …

,

Should you get these identity protection services?

Marriott International was the victim of one of the largest cyberattacks in history. Over four years, hackers stole about 500 million records from Marriott’s Starwood Hotels reservation system. According to Marriott, about 327 million of the accounts included passport details. Hackers exposed the personal data of customers including their credit card numbers. In 2020, two …

,

Would you pay a ransom or not?

By now, you are familiar with the Colonial Pipeline cyber-attack. In this case, hackers used a ransomware attack to take the pipeline offline. Colonial Pipeline’s main gas line carries gasoline and diesel to the U.S. east coast. The attack and subsequent shortage caused more than 1,000 gas stations to run out of fuel. And two …

,

Why thieves are targeting your trash

A group of criminals in St. Tammany Parish, LA were arrested after they went dumpster diving. This criminal ring was targeting trash from a local loan business – one of those “cash now” places. The group rummaged through the trash to gather personal information about customers. They used this information to either steal existing credit …

,

Is your home title already stolen?

Norris Fisher sold $4 million worth of property during his career… But, none of the sales he made were legal. He stole people’s property out from underneath them using forged documents and fake credentials. Here’s an example of the type of crimes Norris and his criminal friends commit: One day, John S. of Fort Worth, …

,

National gun registry?

Federal background checks are required to buy guns from a licensed dealer. But what happens to the paperwork you fill out to buy a gun? What happens with your ATF Form 4473?: Form 4473 is the form that you fill out to buy a gun from a licensed dealer. It’s a few pages long and …

,

Guns you need to be familiar with

For over five years, a man known as the AK-47 Bandit robbed at least seven banks. The FBI gave the man the name because he wore a dark balaclava ski mask, body armor, and black gloves, and carried an AK-47 rifle with a drum magazine during his robberies. During one of his robberies, he shot …

,

Copy these “Insurgent” tactics to survive

During Operation Snipe, personnel from the British 45th Commando Group cleared a remote area of the Afghan mountains. Over 1,000 British personnel were part of the operation. Their goal was to search, clear and, destroy Taliban hideouts in the mountains. During the operation, they discovered a massive cave network and a huge arms cache. The …

,

Website or hacker trap? Here’s how to tell

According to defectors, North Korea’s cyber army has about 7,000 hackers. Their job is to wreak havoc on the country’s enemies. Recently, North Korean hackers targeted cybersecurity researchers in the U.S. North Korean hackers set up a fake cybersecurity company called SecuriElite. They also created fake social media accounts on Twitter and LinkedIn. Their goal …