News

Tampa Bay Tech PoweredUP Tech Festival

Announcing the 4th Annual poweredUP Tech Fest, brought to you by Tampa Bay Tech!

This event features sessions on key trends to not only enlighten but inspire those working in tech in Tampa Bay, with tangible learnings to take back to their workplaces and amplify their projects and initiatives.

This year’s tracks will take a deeper dive into top trends in cybersecurity, the metaverse, blockchain, crypto, bitcoin, NFTs, sustainability in tech, tech for good, DEI (diversity, equity, and inclusion,) leadership, the current state of our tech workforce and more!

Sessions include:

  • A Look into the Metaverse with Accenture
  • CISO Panel, moderated by Pam Lindemoen, CISO Advisor, Cisco
  • The Future is Female Led Panel, moderated by Lauren Coffey, TBBJ & Inno
  • Tech for Good: Purpose-driven Innovation with AWS

And, this year’s Keynote: Cathie Wood, CEO of Ark Invest, with Joe Hamilton, Founder of Catalyst and Metacity.

Tampa Bay Tech PoweredUP Tech Festival2023-07-31T13:24:46-04:00

2023 Government Innovation Florida

Public Sector Network invites you to join the conversation at Government Innovation Florida. This one-day, in-person event will provide the ideal meeting place to learn, collaborate, and discuss current trends and innovations being advanced by public sector leaders across the Sunshine state. With Tracks dedicated to Digital/CX, Data & Technology – this event will offer inspiring cases of innovation from leaders representing a cross-section of State & Local departments and agencies – and underpinned by transformative efforts intended to offer attendees the opportunity to reframe their understanding of innovation for the year to come.

Cyber Florida’s own Deputy Senior Executive Advisor Emilio F. Salabarria will be presenting Innovation in Practice: Cyber Secure Florida Initiative.

2023 Government Innovation Florida2023-07-31T13:31:35-04:00

STEMapalooza

Join us at the 11th annual STEMapalooza! Enjoy interactive activities while discovering new topics within science, technology, engineering, and math.

Every year, STEMapalooza brings the world of innovators to life, featuring workshops, exhibits, panel presentations with women in STEM, hands-on activities, giveaways and more!

Registration deadline is April 9, 2023 at 11:59 pm.

STEMapalooza2023-07-31T13:32:05-04:00

BSides Tampa X 2023

BSides Tampa is an Information Technology Security Conference sponsored by the Tampa Bay Chapter of (ISC)². They are a 100% volunteer-organized event, put on by and for the community. The purpose of BSides Tampa is to provide an open platform for Information Security industry professionals and enthusiasts to collaborate, exchange ideas, and develop
long-standing relationships
with others in the community.

BSides Tampa X 20232023-07-31T13:32:15-04:00

USF 2023 Cyber Summer Camps Open for Registration

Registration for the 2023 University of South Florida cyber summer camps is now open!

If you’re looking for a fun and educational way to keep your K-12 student occupied this summer, check out the list of USF cyber camps available for elementary, middle, and high schoolers. These camps will provide a variety of immersive, hands-on activities to help students gain cyber skills and learn about the potential of a career in cybersecurity.

USF 2023 Cyber Summer Camps Open for Registration2023-04-05T17:27:00-04:00

Phishing Attacks – Helpful Ways to Identify and Avoid Them

Phishing is one of the most common types of cyberattacks that can seriously impact both individuals and organizations. These kinds of attacks can take place almost anywhere online; text, websites, and social media, but are most commonly seen in the form of email.

The SlashNext State of Phishing Report for 2022, released in October, found that there was a 61% increase in the rate of phishing attacks in just the first 6 months of the year compared to last year’s data. Not only have the rates of phishing attacks increased, there was a 50% increase in attacks on mobile devices, with scams and credential theft at the top of the list of payloads.

With all of this in mind, it is perhaps more important than ever to stay vigilant against phishing attacks. Read on to learn more about this type of attack and helpful ways to identify and avoid them.

What is phishing and how does it work?

Phishing is a type of social engineering attack, or an attack that involves psychological manipulation, to steal your personal information or install malicious software on your devices. To accomplish this, cybercriminals will disguise themselves as a legitimate source, such as a well-known company or financial institution, to deliver realistic messages and trick you into giving up your personal information.

Cybercriminals behind these attacks will go to great lengths to make their scams appear legitimate, using the logos and branding of trustworthy sources to disguise themselves. Not only will they create emails under the source’s branding, but they will often create spoofed websites, which are fake websites designed to look legitimate, to accompany them.

The goal of these emails is often to get you to click on a link and enter your personal credentials into the fake website that it leads to. Once that happens, your information will be sent to the attacker behind the scam.

How can I identify a phishing email?

Although it can sometimes be difficult, there are several ways that you can identify a phishing email.

According to fightcybercrime.org, the best ways to identify a phishing email include:

  • Check the sender’s email address. If it is not from a legitimate company, do not open it.
  • Check the URL by hovering over the link.
  • If you are on a desktop computer or laptop, hover over the link with your mouse. You will find the full address of the link either near the link itself or somewhere on the edges of your browser window, depending on what web browser you are using.
  • If you are using your smartphone or tablet, hold your finger down on the link until a window pops up showing the full address of the link. Tap away from the window to close the preview.
  • Be aware of a sense of urgency or threats. For example, phrases such as “you must act now” or “your account will be closed” may be indicators of a phishing attempt.
  • Be cautious of messages that ask for personal information such as your social security number, bank account information, or credit card number.
  • Check for grammatical errors or misspellings.
  • If you are unsure about the message, don’t hesitate to contact the company directly to inquire about it. Don’t use the contact information provided in the email or text message. Look up the company’s contact information on their website or elsewhere.
What can I do if I click on the link or provide my personal information?

If you clicked on a phishing email link or provided your information, first take a deep breath and know that it can happen to anyone.

  • Go to the legitimate website, reset the password on your compromised account and enable two-factor authentication right away. If you are using that password for other accounts, change those too.
  • Forward the suspected phishing email to reportphishing@apwg.org, where the Anti-Phishing Working Group will collect, analyze and share information to prevent future fraud.
  • Mark it as spam.
  • Run a full system scan using antivirus software to check if your device was infected when you clicked the link. If you find viruses, follow these steps on your device. If you still can’t remove the virus, contact a reputable computer repair shop in your area.
Tips & Tricks to Identify a Phishing Email
  • Check the sender’s email address. If it is not from a legitimate company, do not open it.
  • Check the URL by hovering over the link.
    • If you are on a desktop computer or laptop, hover over the link with your mouse. You will find the full address of the link either near the link itself or somewhere on the edges of your browser window, depending on what web browser you are using.
    • If you are using your smartphone or tablet, hold your finger down on the link until a window pops up showing the full address of the link. Tap away from the window to close the preview.
  • Be aware of a sense of urgency or threats. For example, phrases such as “you must act now” or “your account will be closed” may be indicators of a phishing attempt.
  • Be cautious of messages that ask for personal information such as your social security number, bank account information, or credit card number.
  • Check for grammatical errors or misspellings.
  • If you are unsure about the message, don’t hesitate to contact the company directly to inquire about it. Don’t use the contact information provided in the email or text message. Look up the company’s contact information on their website or elsewhere.

As we continue into 2023, it’s guaranteed that cybercriminals will continue to launch more and more phishing campaigns with the hopes of stealing personal information from unsuspecting victims. Remember to always be cautious online and when in doubt, always do your research!

Information retrieved from fightcybercrime.org. For more details on phishing attacks, visit: https://fightcybercrime.org/scams/hacked-devices-accounts/phishing/

Phishing Attacks – Helpful Ways to Identify and Avoid Them2023-01-09T11:34:22-05:00

The Top Red Flags of a Veterans Day Scam

As Veterans Day approaches, many Americans may be searching for opportunities to give back to those who have served our country by donating to charity. Unfortunately, malicious scammers on the internet are notorious for taking advantage of the honorary day by using communication techniques similar to trusted military nonprofits to mislead prospective donors.

FightCybercrime.org recently released an article discussing the top red flags of a veteran charity scam. According to the article, “Through targeted communications, scammers use names similar to well-known charities and flood their communications with words like “hero,” “sacrifice” and “disabled” to pull on the heartstrings of compassionate Americans. Oftentimes, these fake charities will create targeted lists by searching social media for people who support the military. Other times, these scammers will imitate existing fundraisers or charities around military observances—such as Veterans Day—when the military is top of mind.” The top red flags of a veteran charity scam may include:

1. Receiving a thank you for a donation you don’t remember making

Fake charities will thank you for a donation that you never made in hopes that you will give “again” without questioning the legitimacy of their organization. If you receive communication that praises you for a donation you don’t remember making, proceed with caution.

2. Refusal to provide charity information

If a charity refuses to provide basic information about the organization itself or how your donation will be used, be wary. Legitimate organizations are happy to provide you with answers to all your questions before you donate. Prior to donating to any charity, we recommend doing some research. Search the charity’s name on sites like GuideStar, Charity Navigator or the BBB Wise Giving Alliance, which provide donors with free access to data, tools, and resources to make informative giving decisions.

3. Use of high-pressure tactics

Real charities appreciate donations whenever you are ready to give, so be wary of anyone who pressures you to donate right away. They are trying to get your money before you have time to do research or question their legitimacy. If someone is using high-pressure tactics to try to get you to donate, hang up or don’t respond until you’ve had time to do some investigating. We recommend running an internet search of the charity’s name followed by the word “scam” or “complaint”.

4. Requests for unusual payment method

If the charity asks you to donate using an unusual payment method like gift cards, cryptocurrency, cash or money transfer, it’s a scam. Scammers like these types of payment methods because they are untraceable. Credit cards or checks are much safer payment methods that can be tracked down if something goes wrong—and a legitimate charity will gladly accept these types of payment methods.

5. Demand for personal information

If a charity asks you to provide personal information—such as your Social Security Number or bank account number—it’s a scam. Real charities don’t need this type of information to process a donation. If you are required to provide personal information you aren’t comfortable sharing, look for another charity to donate to. To find a reputable charity, search for well-known organizations that support the cause you’re interested in.

Veterans Day is a day for honoring those who have sacrificed their lives for our freedom. Sadly, veteran charity scams look to take advantage of Americans who wish to give back. Remember, when in doubt, do your research! Reputable charities will not pressure you into making a donation without answering your questions, and they will never ask for sensitive information. If you are targeted by a scammer, report it to the Federal Trade Commission at ReportFraud.FTC.gov.

Information retrieved from FightCybercrime.org. To view the full article and learn more about Veterans Day scams, visit:
https://fightcybercrime.org/blog/how-to-spot-veteran-charity-scams/
The Top Red Flags of a Veterans Day Scam2022-11-10T10:58:20-05:00

UWF Experts Works to Protects Cars from Cyberattacks

“Almost all modern automotive vehicles are equipped with some form of electronic connectivity through GPS devices, smartphones, telematics devices, roadside sensor units, on-board devices, WiFi, among others,” Francia said. “On one hand, these connectivity features provide newly found conveniences. On the other hand, they provide an expanded attack surface that adversaries can take advantage of.”

Francia explained one example is an adversary successfully taking control of a vehicle’s speed on a busy interstate highway. He has been part of a research group known as the Transatlantic (US-Ireland-Northern Ireland) working group on IoT/CPS Cybersecurity Research. Their research has uncovered several cyber threats related to connected vehicles including that the radio frequency signal from keyless remote fob transmitter can be intercepted and cloned for replay attack; the vulnerabilities in automotive controls due to insecure communication channels; the susceptibility of the inter-vehicle network due to an insecure protocol; and the viability of Machine Learning techniques in recognizing various attacks on the vehicle network.

Francia’s research project on securing connected cars from cybersecurity threats began in 2019. It has received funding support from the National Security Agency, the Florida Center for Cybersecurity, the Office on Naval Research and the Florida Department of Transportation. The workshop was supported by the National Science Foundation (USA), Department for the Economy (Northern Ireland), and Science Foundation of Ireland (Republic of Ireland).

For more information on UWF’s Center for Cybersecurity, visit uwf.edu/cyber.

Article available at https://news.uwf.edu/uwf-cybersecurity-expert-shares-research-on-connected-vehicle-security-warns-of-vulnerabilities-in-modern-vehicles/.

UWF Experts Works to Protects Cars from Cyberattacks2022-10-27T10:42:35-04:00