{"id":6841,"date":"2017-03-02T12:10:22","date_gmt":"2017-03-02T20:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/02\/news-632\/"},"modified":"2017-03-02T12:10:22","modified_gmt":"2017-03-02T20:10:22","slug":"news-632","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/03\/02\/news-632\/","title":{"rendered":"Coachella-gate: fire in the disco"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Thu, 02 Mar 2017 19:09:02 +0000<\/strong><\/p>\n<p>I&#8217;d like to make some smart references to the <a href=\"https:\/\/www.jambase.com\/article\/coachella-announces-2017-lineup\" target=\"_blank\">Coachella event<\/a>, except that I&#8217;ve only heard of about \u00a0six of the acts, one of them is named after a TV show and I mean, come on&#8230;&#8221;Swet Shop Boys&#8221;?<\/p>\n<p>Instead, I&#8217;ll begin by pointing out that the last time I went to a music festival was in 2001, and there was a huge riot, a power generator exploded and set my tent on fire, and I was stranded on a hill at 2AM with half a\u00a0dozen firemen holding axes. I am not the right person to ask, unless you want to know about sleeping in a ditch at 2AM with no tent due to it being a smoking pile of burnt ash.<\/p>\n<p>What we have here is a <em>different<\/em> kind of risk, in the form of a <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/coachella-festival-credentials-for\/\" target=\"_blank\">compromised database<\/a> up for grabs on the Dark Web. The data swiped includes the following:<\/p>\n<blockquote>\n<p><em>Usernames, first and last names, shipping addresses, email addresses, phone numbers and dates of birth.<\/em><\/p>\n<\/blockquote>\n<p>You don&#8217;t even need to know Beyonce pulled out of the event to know this isn&#8217;t a good thing, as it opens the door to very personalized phishing attempts. Smooth criminals will no doubt fire off some fake refund\/special festival deals at people who may not know about the breach, so it&#8217;s crucial we heal the world by ensuring word gets out about what happened.<\/p>\n<p>If, after you&#8217;ve finished working 9 to 5, you become a calendar girl and spend a perfect day mapping out upcoming events for a nice Saturday in the park\u2014and yes, this is the obligatory section\u00a0jamming in as many song titles as possible, I won&#8217;t do it again\u2014then you should keep one hand in your pocket, and the other pointing at dubious emails (Sorry. Sorry. Won&#8217;t do it again. And anyway, it wasn&#8217;t me).<\/p>\n<p>The good news is, no payment information was compromised\u2014but by the same token, cards can be canceled and replaced. It&#8217;s a bit trickier to replace the information swiped above, to varying degrees of difficulty and\/or time-wasting inconvenience. Lots of techniques exist for spotting a fake mail and more often than not a <a href=\"http:\/\/www.techrepublic.com\/blog\/10-things\/10-tips-for-spotting-a-phishing-email\/\" target=\"_blank\">few moments of fact checking<\/a> works wonders.<\/p>\n<p>If you&#8217;re off to Coachella this year, have a good time and remember to go directly to the source where all email missives are concerned. There may be dancing in the street in California, but the man who sold the world\u2014and quite possibly your home address\u2014is still in no immediate danger of having some Folsom city blues.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Chris &#8220;Martin&#8221; Boyd<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/03\/coachella-gate-fire-in-the-disco\/\">Coachella-gate: fire in the disco<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/03\/coachella-gate-fire-in-the-disco\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Thu, 02 Mar 2017 19:09:02 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/03\/coachella-gate-fire-in-the-disco\/' title='Coachella-gate: fire in the disco'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/gig.jpeg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>If you&#8217;re registered on the Coachella website, you may have been swept up in a data breach hawking user details for sale on the Dark Web&#8230;<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/beyonce\/\" rel=\"tag\">Beyonce<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/breach\/\" rel=\"tag\">breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coachella\/\" rel=\"tag\">coachella<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phish\/\" rel=\"tag\">phish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/03\/coachella-gate-fire-in-the-disco\/' title='Coachella-gate: fire in the disco'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2017\/03\/coachella-gate-fire-in-the-disco\/\">Coachella-gate: fire in the disco<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[6137,11510,11511,4503,11172,10546,10511,3924,10510],"class_list":["post-6841","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-beyonce","tag-breach","tag-coachella","tag-cybercrime","tag-data-breach","tag-malwarebytes-news","tag-phish","tag-phishing","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6841"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6841\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}