<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://community.pexa.com.au/t5/Security/ct-p/Security</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Thu, 28 Feb 2019 16:54:09 GMT</pubDate>
    <dc:creator>Security</dc:creator>
    <dc:date>2019-02-28T16:54:09Z</dc:date>
    <item>
      <title>Ransomware: The profitable business of cybercrime industry</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Ransomware-The-profitable-business-of-cybercrime-industry/m-p/14644#M15</link>
      <description>&lt;P&gt;Recently, it was reported that a &lt;A href="https://www.theage.com.au/national/victoria/crime-syndicate-hacks-15-000-medical-files-at-cabrini-hospital-demands-ransom-20190220-p50z3c.html" target="_blank" rel="noopener"&gt;Victorian hospital&lt;/A&gt; fell victim to a cybercrime syndicate that held 15,000 medical files to ransom. This attack, a probable result of a phishing scam, inadvertently opened by a staff member, resulted in criminals hacking into the hospital’s server to plant ransomware that scrambled and encrypted data, locking access to files from medical staff.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ransomware can happen in different forms. For hospitals, holding their data at ransom not only creates reputational damage but could have a serious impact on their patients. Another method of ransomware is to attack a company's IT infrastructure by disabling employee access to laptops or servers. The company is then held to ransom and the payment method is typically demanded in bitcoin or other forms of cryptocurrency. The use of cryptocurrency is prevalent in the cyber fraud community because of its ability to be transferred anonymously.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In 2017, &lt;A href="https://www.businessinsider.com.au/hackers-broke-into-amazon-cloud-to-mine-bitcoin-2017-10?r=US&amp;amp;IR=T" target="_blank" rel="noopener"&gt;two&lt;/A&gt; companies had their Amazon Web Services accounts compromised by hackers using the victims’ bandwidth and computing power to &lt;A href="https://www.bitcoinmining.com/" target="_blank" rel="noopener"&gt;mine bitcoins&lt;/A&gt;, an energy intensive, but potentially lucrative exercise.&lt;A href="applewebdata://F359015F-DE29-416E-A8B3-FC9A824AD1C5#_ftn1" target="_blank" rel="noopener" name="_ftnref1"&gt;&lt;SPAN&gt;[1]&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Data ransom and bitcoin mining may seem simple and straightforward when compared to more sophisticated hacks such as one which occurred in 2017. The attack, called WannaCry, infected up to &lt;A href="https://www.abc.net.au/news/2017-05-15/ransomware-attack-to-hit-victims-in-australia-government-says/8526346" target="_blank" rel="noopener"&gt;200,000&lt;/A&gt; computers, locking up users’ data in 150 countries, and demanded a ransom to release them. WannaCry was so damaging because the cyber criminals managed to exploit the vulnerabilities of older of Windows software when newer, more secure versions were available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Australia, conservative estimates show that cybercrime costs the economy in excess of &lt;A href="https://www.smartcompany.com.au/technology/from-millions-to-malware-cyber-attacks-in-australia-by-the-numbers/" target="_blank" rel="noopener"&gt;AUD 1B&lt;/A&gt; each year. More than 500,000 small Australian businesses fell victim to cybercrime in 2017 and it is estimated that the majority paid an average of &lt;A href="https://www.smartcompany.com.au/technology/from-millions-to-malware-cyber-attacks-in-australia-by-the-numbers/" target="_blank" rel="noopener"&gt;AUD 4,677&lt;/A&gt; in ransom to unencrypt their data. Often small business fall victim as in some cases, maintaining the latest version of IT software is not their highest priority.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 999px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4433i8DF98D4A482302E5/image-size/large?v=1.0&amp;amp;px=999" alt="Screen Shot 2019-02-22 at 2.32.54 pm.jpg" title="Screen Shot 2019-02-22 at 2.32.54 pm.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Source: Smart Company, &lt;/EM&gt;&lt;A href="https://www.smartcompany.com.au/technology/from-millions-to-malware-cyber-attacks-in-australia-by-the-numbers/" target="_blank" rel="noopener"&gt;&lt;EM&gt;From millions to malware: Cyber attacks in Australia by the numbers&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;, July 2018&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The cybercrime landscape is ever evolving, and it is therefore imperative for our industry to continually develop and advance a robust security framework. As an industry, we must uphold the highest standards when it comes to cyber security and maintaining the latest in secure software versions. This is non-negotiable when dealing with someone’s most important and emotionally significant investment – their home.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At PEXA, we are determined to ensure that the cyber security practices we have in place continue to protect our members and their customers. Our IT systems are annually audited by external professionals and we continually explore new ways to bolster the security posture of our network. This is achieved by investing, maintaining and constantly improving security controls as well as running a Security Operations Centre to monitor, detect, and respond to cyber-attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the measures PEXA takes to bolster security, visit &lt;A href="https://community.pexa.com.au/t5/Security-Updates/bd-p/Security-Updates" target="_blank" rel="noopener"&gt;PEXA’s online Community forum&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="applewebdata://F359015F-DE29-416E-A8B3-FC9A824AD1C5#_ftnref1" target="_blank" rel="noopener" name="_ftn1"&gt;&lt;SPAN&gt;[1]&lt;/SPAN&gt;&lt;/A&gt; Bitcoin miners pool together different computers to solve complex algorithms, success of which generates a set number of valuable new bitcoins.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2019 03:33:44 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Ransomware-The-profitable-business-of-cybercrime-industry/m-p/14644#M15</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-02-22T03:33:44Z</dc:date>
    </item>
    <item>
      <title>un-hackable network.</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/un-hackable-network/m-p/14596#M18</link>
      <description>&lt;P&gt;Is this a unicorn?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.dailymail.co.uk/sciencetech/article-4727572/China-launching-unhackable-computer-network.html" target="_blank" rel="noopener"&gt;https://www.dailymail.co.uk/sciencetech/article-4727572/China-launching-unhackable-computer-network.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 05:30:35 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/un-hackable-network/m-p/14596#M18</guid>
      <dc:creator>DMc</dc:creator>
      <dc:date>2019-02-20T05:30:35Z</dc:date>
    </item>
    <item>
      <title>Security alert | phishing e-mail - RESOLVED</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-phishing-e-mail-RESOLVED/m-p/14459#M12</link>
      <description>&lt;DIV class="lia-quilt-column lia-quilt-column-18 lia-quilt-column-left lia-quilt-column-main-left"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-left"&gt;
&lt;DIV id="messageBodySimpleDisplay" class="lia-message-body lia-component-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is aware of a phishing e-mail received by various members of your network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details of phishing e-mail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;From&lt;/U&gt;: Pexa Admin&lt;/P&gt;
&lt;P&gt;&lt;U&gt;E-mail&lt;/U&gt;:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;dfsffgsgg@telus.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;U&gt;Subject&lt;/U&gt;: Monro-Sale: New conversation message received - Financial Settlement - Payout figure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The e-mail implies that the reader has received a message from ANZ RETAIL AND SMALL BUSINESS. It includes a Workspace number and requests the recipient to click on a link to read a message.&lt;/P&gt;
&lt;P&gt;This is an example of a cyber-criminal creating an e-mail to resemble PEXA communications. It is likely member e-mail addresses were sourced from publicly available information online.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;See below for a screenshot of the e-mail.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you received this e-mail, clicked on the link and entered your PEXA username and password, &lt;STRONG&gt;we advise you to reset your PEXA password now&lt;/STRONG&gt;. Please note, multi-factor authentication on entering your PEXA account protects you against unauthorised persons accessing your account.&lt;/P&gt;
&lt;P&gt;If not the above, and you receive a similar phishing e-mail or another you believe to be suspicious, please:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the e-mail&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank" rel="nofollow noopener noreferrer"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note, all PEXA Workspace e-mails are system-generated from PEXA and will be received from&amp;nbsp;pexa.admin@pexa.com.au.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;PEXA will never send you an e-mail advising you to click a link to access the PEXA Exchange, and will always direct you to login to access your account via pexa.com.au.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank" rel="nofollow noopener noreferrer"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" style="width: 846px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4387i6A4C0022A301EF8A/image-size/large?v=1.0&amp;amp;px=999" alt="2019-02-11 14_04_57-Photos_phishingemail.png" title="2019-02-11 14_04_57-Photos_phishingemail.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-rating-metoo lia-component-me-too"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 04:00:30 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-phishing-e-mail-RESOLVED/m-p/14459#M12</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2019-02-15T04:00:30Z</dc:date>
    </item>
    <item>
      <title>Security alert | Phishing e-mail - RESOLVED</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail-RESOLVED/m-p/13954#M11</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is aware of an instance where a member’s e-mail account has been hacked. The hacker proceeded to send e-mails from the conveyancer’s account to other PEXA members.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The e-mail sent by the hacker informed the recipient of a shared document from PEXA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Screenshot of e-mail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 731px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4249i8ED8CE24E77F8221/image-size/large?v=1.0&amp;amp;px=999" alt="phishing.png" title="phishing.png" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;screenshot of phishing e-mail&lt;/span&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a similar phishing e-mail or another you believe to be suspicious, please:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the email&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Please note, all PEXA workspace e-mails are system-generated from PEXA. To receive a task related e-mail from a fellow PEXA member is unusual and unnecessary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For outstanding tasks, please check your workspace(s) via your PEXA account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails &lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;</description>
      <pubDate>Wed, 19 Dec 2018 05:30:22 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail-RESOLVED/m-p/13954#M11</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2018-12-19T05:30:22Z</dc:date>
    </item>
    <item>
      <title>A Hacker's Tale - A look behind the curtain #2</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-2/m-p/13784#M10</link>
      <description>&lt;P&gt;&lt;FONT size="5"&gt;It’s more than just an Internet romance...&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The lover’s tale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Abigail thinks she’s in love. It must be love. She’s been looking for love for a while and Elliot seems like the perfect guy. Many of her friends have warned her about internet romances but Elliot’s different. He has never asked her for money. Never asked her for anything. She thinks he might be quite wealthy in fact. He is always moving money around. He’s been struggling lately though. So, she’s been helping him transfer money to his accounts. For some reason, he’s having issues sending money to his overseas account. Abigail doesn’t really know the reasons why, nor does she question it. It all seems too complicated, and as long as it’s not her money she’s transferring over, it must be okay… besides he’s committed to the relationship. He said they will be together soon.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Over the past couple of weeks Abigail’s been transferring money for Elliot’s family and friends. They are all preparing for a big holiday and need the money ready to meet them. It’s not much – a couple of hundred here and there. Now he’s asked for her help to transfer funds from the sale of his property in Australia.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a few days ago, Abigail received $250,000 to her account. She’s not meant to transfer everything over to him though. Elliot told her that while he was excited to have sold his house, he needs to move the money in parts to avoid government taxes. He’s asked her to transfer just under $10,000 at a time, over several days, because that way it doesn’t trigger any alerts. Abigail doesn’t completely understand the reasoning, but Elliot is good to her. He said they will meet face-to-face now that he has sold his house, and she is excited to finally put a face to her love.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the third day in a row she has made the transfer. Something strange has happened though, all her accounts have now been frozen, and her bank keeps leaving messages to call them back.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" style="width: 400px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4242i3C782706A1FD52C4/image-size/medium?v=1.0&amp;amp;px=400" alt="Image_internet romance.jpg" title="Image_internet romance.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The practitioner’s tale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Meanwhile your client, Grace, is frantic. She hasn’t received her house’s sale proceeds yet. It’s been a couple of days; how has this happened? You arranged the transfer of the money according to her instructions which you received just before finalising the payment. You look back at the details and see the account name &lt;EM&gt;Abigail King&lt;/EM&gt; and a different BSB – not your client’s.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Wait. What’s happening?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Going back through the email trail you realise that there’s something funny about the email address. The instruction did not come from Grace. Blood drains from your face… you call the bank immediately to try and stop the funds from disappearing. Hopefully it’s not too late.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Hacker’s tale&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Meanwhile, Elliot is busy moving money around several of his accounts across the world and connecting with different people online. While he’s looking for a way to gain access to steal the funds, he has also been cultivating internet romances with men and women to transfer the funds outside of Australia. He loves living in the &lt;EM&gt;internet era&lt;/EM&gt; where crimes can be performed anonymously, and no-one ever has to see his face. On the internet you can pretend to be whoever you want, and a lot of people believe you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Money Mules&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Unfortunately, the above scenario is all too common. Cyber criminals often use middlemen to transfer stolen money to their accounts. These middlemen are real people, with real accounts and they don’t have unusual bank account activity. Known as money mules, they are sometimes recruited or deceived into helping cyber criminals carry out these crimes. Offenders like our fictitious character Elliot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These criminals have been known to recruit money mules via romance scams or employment scams. In a romance scam, the ‘money mule’ is emotionally invested and could also be considered a victim. Employment scams often offer potential money mules a job that requires minimal effort with lucrative returns – for instance, a small commission for receiving and transferring money.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to the &lt;SPAN&gt;&lt;A href="https://www.afp.gov.au/what-we-do/crime-types/cyber-crime/online-fraud-and-scams" target="_blank" rel="noopener"&gt;Australian Federal Police&lt;/A&gt;&lt;/SPAN&gt;, it is a crime to transact in the movement of stolen funds, even if you are unaware that you are acting as a money mule. Money mules are caught because they are not trying to hide their activities, and when caught, they can have their entire bank accounts, including their own funds, suspended and potentially face criminal prosecution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How can I protect myself?&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Be wary of advertisements for a guaranteed income or job with lucrative returns and very little effort&lt;/LI&gt;
&lt;LI&gt;Don’t transfer money on behalf of someone else, especially when you have never met them&lt;/LI&gt;
&lt;LI&gt;Never give your bank details to anyone&lt;/LI&gt;
&lt;LI&gt;Protect your personal information and be suspicious if anyone asks you for those details&lt;/LI&gt;
&lt;LI&gt;Be cautious of people seeking financial assistance or asking you for financial details – money sent via wire transfer is rarely recoverable&lt;/LI&gt;
&lt;LI&gt;As a business operator, when receiving instructions to transfer money, confirm that the instructions you’ve received have come from your client - verbally confirm details or changes with your client&lt;/LI&gt;
&lt;LI&gt;Be cautious of situations where the name on the account differs from that of your customer&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;I think I am a victim, what can I do?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Anyone who has disclosed their bank account details, received funds into their account or suspect that they are a victim of a mule scam should contact their bank or financial institution immediately.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on this and more, please refer to &lt;SPAN&gt;&lt;A href="https://www.scamwatch.gov.au/types-of-scams/jobs-employment/jobs-employment-scams" target="_blank" rel="noopener"&gt;Scam Watch&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 22:04:58 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-Tale-A-look-behind-the-curtain-2/m-p/13784#M10</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-01-24T22:04:58Z</dc:date>
    </item>
    <item>
      <title>A Hacker's tale - A look behind the curtain #1</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-tale-A-look-behind-the-curtain-1/m-p/13116#M6</link>
      <description>&lt;P&gt;&lt;FONT size="5"&gt;Shhh! Someone's listening...&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An uninvited guest, Elliot, has inserted himself into your conversation. You are sitting at a coffee shop having a chat with your client Grace, and unbeknownst to you, Elliot, at the next table is virtually listening to your entire conversation. This unwanted guest eavesdrops the conversation with your client and gathers all their critical information. When you leave the table, he continues the conversation with your client pretending to be you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 400px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4129i95A561EE592E9D3D/image-dimensions/400x256?v=1.0" width="400" height="256" alt="quiet image.jpg" title="quiet image.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know what you’re thinking - this would not be possible face-to-face. Your client, Grace, knows what you look like, what you sound like. But what if I told you that this is not improbable at all… this is happening online today.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This seemingly far-fetched scenario is a very real cyber-attack method, aptly called man-in-the-middle (MITM). The hacker, in this instance, Elliot, effectively intercepts your conversation, places himself in the middle and conveys the information he wants to pass on to both sides.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How could this happen?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Hackers like Elliot use various methods to gain access to your computer systems. Elliot may have used a phishing scam, or capitalised on poorly secured Wi-Fi routers, often found in public areas with free hotspots. His goal is to obtain your password and access your email account. The current statistics show an increase of&amp;nbsp;&lt;A href="https://www.itgovernanceusa.com/blog/80-increase-in-business-email-compromise-attacks/" target="_blank"&gt;80% in hacks performed through an email compromise&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Changing your password may not be enough&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Once Elliot has got into your system, he can create a rule that automatically forwards your emails to a secondary account. This means that any email you receive is also sent to his email account. Using further filtering with key words, he only needs to monitor what he deems as relevant emails. So, even if you regularly change your email password, in this scenario, the hacker still has access to your emails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How does it work?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;With access to your emails, Elliot then uses the information he has obtained, and, mimicking your email style, he can begin a new conversation as you, with your client, Grace. With valuable context acquired, the hacker then impersonates Grace, responding to your emails.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once he has obtained the information required, he then exits the conversation. You and your client, Grace, are none the wiser, until that is, you realise you are a victim of a scam. By then, money has exchanged hands and you may or may not be able to recover missing funds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;What can you do to protect against a MITM attack?&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Be aware of potential phishing emails. They could appear to be from a trusted source, masked as from your family, friends or even your bank. Instead of clicking on the link, type the website address into your browser.&lt;/LI&gt;
&lt;LI&gt;Moving your mouse over the link will show the website name. If the name doesn’t look like the site, don’t click on it.&lt;/LI&gt;
&lt;LI&gt;Use secure Wi-Fi networks, or if using public networks, connect with a virtual private network (VPN)&lt;/LI&gt;
&lt;LI&gt;Ensure you have a &lt;SPAN&gt;comprehensive internet security solution&lt;/SPAN&gt;. An interesting article on this topic can be found&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://www.inc.com/symantec/building-a-comprehensive-security-solution.html" target="_blank"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;I think I am a victim, what can I do?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If you suspect that you’re a victim of a scam:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Change your passwords to be unique on all of your systems.&lt;/LI&gt;
&lt;LI&gt;Check if there are any forwarding rules in your email account, and if found:
&lt;OL&gt;
&lt;LI&gt;Record the email address being forwarded to&lt;/LI&gt;
&lt;LI&gt;Confirm no-one in your organisation created this rule&lt;/LI&gt;
&lt;LI&gt;Have your team check their email accounts for forwarding emails and reset their passwords too&lt;/LI&gt;
&lt;LI&gt;Inform your clients by telephone and verbally reconfirm all details, especially bank account details&lt;/LI&gt;
&lt;LI&gt;Delete the rule&lt;/LI&gt;
&lt;LI&gt;If this has impacted your PEXA business, inform PEXA Security alias – &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au?subject=I%20found%20my%20email%20is%20forwarding%20to%20a%20scam%20account" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&amp;nbsp;&lt;/SPAN&gt;PEXA is working with Law Enforcement to identify these types of behaviours and any information you provide could help in the tracking and potential capture of those involved in cyber-crime.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;At PEXA…&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Multi-factor authentication (MFA) provides an additional level of security to access your PEXA Workspace. The levels include your PEXA account name, password, your MFA token, and your digital signing token and pin. However, you still need to be vigilant when it comes to communicating with your client. Soon, PEXA will introduce a new app that will allow your clients to input financial data directly into the Workspace and enable you to request and receive information from your clients securely. [Stay tuned]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As our world becomes more and more connected online, it’s important to be aware of the cyber threats that could compromise the security of your personal information and business operations. Cyber criminals have a low cost of entry into criminal activities and they often have the anonymity to avoid detection. With many targets they will usually go for the easiest person to scam so stay informed and be aware. Collectively, we are better together, as we work as one to reduce the threat of cyber-crime and stay smart online.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By Craig Brown, Head of PEXA Security&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 05:14:13 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/A-Hacker-s-tale-A-look-behind-the-curtain-1/m-p/13116#M6</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2018-12-20T05:14:13Z</dc:date>
    </item>
    <item>
      <title>PEXA Security Initiatives</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/PEXA-Security-Initiatives/m-p/12813#M5</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The team at PEXA continues to explore techniques and technologies to align with the ever-changing security landscape. Below is an update on current security initiatives happening on the PEXA platform including our insights into a &lt;SPAN&gt;topical&amp;nbsp;&lt;/SPAN&gt;security concern – phone porting.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Multi-Factor Authentication &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In September, &lt;SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Multi-factor-authentication-FAQs/ba-p/10693" target="_blank" rel="noopener"&gt;multi-factor authentication (MFA)&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;was rolled out to PEXA members. MFA requires the user to provide two or more types of evidence to verify their identity when logging in to an account or completing a transaction. This includes a password and unique authentication code which regularly changes. Members choose to receive an authentication code by SMS, the PingID mobile app, or the PingID desktop app.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MFA was added as another layer of authentication on top of &lt;SPAN&gt;&lt;A href="https://community.pexa.com.au/t5/Help-Centre/Five-things-to-remember-about-Digital-Certificates/ba-p/9246" target="_blank" rel="noopener"&gt;digitally signing&lt;/A&gt;&lt;/SPAN&gt;. Members with the relevant authority must digitally sign-off transactions with their unique [bespoke] digital signing token and PIN, confirming that all details are correct prior to the transfer of funds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More than verification&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Additionally, we initiated the following measures to boost the protection of members while transacting online:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Increased monitoring&amp;nbsp;&lt;/STRONG&gt;of unusual activity surrounding password resets, new user creations and changes to BSB and account numbers. If such activity is detected by PEXA, a member of PEXA’s team will contact members to confirm that the activity is legitimate.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Machine learning&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;algorithms&amp;nbsp;&lt;/STRONG&gt;to detect behavioural anomalies on a per user basis. If the behavioural pattern of a user changes, PEXA’s risk profiling mechanism is activated to trigger an alert. The member will then be promptly contacted by PEXA’s Security team.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Workspace time stamps and summary screen&amp;nbsp;&lt;/STRONG&gt;so that members can see when the Financial Settlement Schedule was last updated and by which user.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Phone porting&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A current concern from industry is the possibility of phone porting – a situation where a scammer uses your personal details to port your mobile number from one provider to another, therefore accessing further personal details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With a suite of security measures in place to protect PEXA members and your clients, and lawyers and conveyancers continuing to practice their due diligence, the small percentage of members who have chosen to receive their authentication code via SMS should not be alarmed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;It is important to note that for phone porting to occur, the scammer would require several pieces of a user’s ID, as well as the ability to convince a service provider to transfer the SIM details from one telco to another. Therefore, not only would the scammer need to know the targeted user’s personal information, they would also need to know if that user has chosen SMS as the preferred method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To assist in preventing this from happening, I advise members to remain vigilant of people calling, emailing and requesting personal details.&lt;/P&gt;
&lt;P&gt;If you have any questions about this information, please don’t hesitate to reply below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Craig Brown&lt;BR /&gt;Head of PEXA Security&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 03:17:01 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/PEXA-Security-Initiatives/m-p/12813#M5</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2019-02-28T03:17:01Z</dc:date>
    </item>
    <item>
      <title>Stay Smart Online Week</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Stay-Smart-Online-Week/m-p/12742#M4</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 999px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4041i01E0D816406444FA/image-size/large?v=1.0&amp;amp;px=999" alt="Twitter_Header.jpg" title="Twitter_Header.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This week is &lt;/SPAN&gt;&lt;A class="_58cn" href="https://www.facebook.com/hashtag/staysmartonline?source=feed_text&amp;amp;__xts__%5B0%5D=68.ARAoAjr4jW-G12j8nANgoLiI-VrXvhsFBajvOl3LovrqGuahnuFd4kEuFv0NAlbWGORr9Uhz2lzRaY_4JiBFJRvvFcmIyPP5Ol2rxGoJMRB4T5frbKPE2GEhIzBQadySOBkC2b1bu3wZQPRH9ExHLL0QyRv6Kp8UexuTUqwNyKwRio13RRyPlg&amp;amp;__tn__=%2ANK-R" data-ft="{&amp;quot;type&amp;quot;:104,&amp;quot;tn&amp;quot;:&amp;quot;*N&amp;quot;}" target="_blank"&gt;&lt;SPAN class="_5afx"&gt;&lt;SPAN class="_58cl _5afz"&gt;#&lt;/SPAN&gt;&lt;SPAN class="_58cm"&gt;StaySmartOnline&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; Week.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The campaign aims to reverse the threat of cyber-crime by empowering people to discuss and own their cyber-security.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Over the next few days we’ll be sharing a number of best-practice resources to assist you, here on Community and on PEXA's social channels.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;LI-VIDEO vid="https://www.youtube.com/watch?v=JdvjqUb_fmo" align="center" size="small" width="200" height="113" uploading="false" thumbnail="https://i.ytimg.com/vi/JdvjqUb_fmo/hqdefault.jpg" external="url"&gt;&lt;/LI-VIDEO&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Oct 2018 02:55:39 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Stay-Smart-Online-Week/m-p/12742#M4</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-10-08T02:55:39Z</dc:date>
    </item>
    <item>
      <title>Security alert | Phishing e-mail</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail/m-p/12313#M3</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PEXA is aware of a phishing e-mail received by a member of your network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details of phishing e-mail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;From: Jessica Wong&lt;/P&gt;
&lt;P&gt;E-mail: &lt;SPAN&gt;cains8x@nsas.avinetmail.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The e-mail implies to have a contract of sale attached and requests to settle via PEXA. See below for a screenshot of the e-mail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a similar phishing e-mail or another you believe to be suspicious, please:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Do not respond&lt;/LI&gt;
&lt;LI&gt;Do not click links or download attachments&lt;/LI&gt;
&lt;LI&gt;Delete the email&lt;/LI&gt;
&lt;LI&gt;Report it to your relevant security administrator or e-mail PEXA’s security team at &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about phishing e-mails &lt;SPAN&gt;&lt;A href="https://www.pexa.com.au/security/how-to-protect-your-business#identify-spam-and-phishing" target="_blank"&gt;here&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 256px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/4005iE5FDB857EE0E30D6/image-size/medium?v=1.0&amp;amp;px=400" alt="Phishing e-mail.png" title="Phishing e-mail.png" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Phishing e-mail&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 01:11:34 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-alert-Phishing-e-mail/m-p/12313#M3</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2018-09-11T01:11:34Z</dc:date>
    </item>
    <item>
      <title>PEXA Digital Certificate Software not correctly digitally signed</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/PEXA-Digital-Certificate-Software-not-correctly-digitally-signed/m-p/12222#M1</link>
      <description>&lt;P&gt;PEXA's digitial certificate software download is signed with a certificate issued to 'pexa.net.au'.&amp;nbsp; Why should anyone trust software signed by a website?&amp;nbsp;Especially&amp;nbsp;one that is not in use? It is trivial to register website names, and numerous 'pexa.' domains are available for registration now by anyone.&amp;nbsp; How are we to discern whether pexa.net.au is actually&amp;nbsp;owned by the Property Exchange Australia Limited?&amp;nbsp; How then, are we to determine whether to trust the signer and install this software?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The software should be signed with a certificate issued to&amp;nbsp;&lt;SPAN&gt;PROPERTY EXCHANGE AUSTRALIA LIMITED.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Surely PEXA does not think that users should ignore incorrect security certification of its software? Or that we should trust anything with 'PEXA' in it somewhere? This is EXACTLY how fake (malicious) software is promulgated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a snip of what the digital signatures look like on correctly signed software by two other well known software companies (left hand side)&amp;nbsp;and on the right-hand side,&amp;nbsp;a snip of the PEXA software signature.&amp;nbsp; (Red markup added by me for emphasis)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" style="width: 910px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/3999i87CC552EBB1949EA/image-size/large?v=1.0&amp;amp;px=999" alt="Pexa Digital Software Certificate.png" title="Pexa Digital Software Certificate.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I posted about this in the general forum section, but received no response.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Sep 2018 12:10:15 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/PEXA-Digital-Certificate-Software-not-correctly-digitally-signed/m-p/12222#M1</guid>
      <dc:creator>Andrew_GC</dc:creator>
      <dc:date>2018-09-05T12:10:15Z</dc:date>
    </item>
    <item>
      <title>Member security alert | phone scam</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Member-security-alert-phone-scam/m-p/11702#M1</link>
      <description>&lt;P&gt;Hi Community,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;PEXA is aware of a current phone scam purporting to come from PEXA.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;So far, two cases have been identified.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Details&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phone call one: Scammers contacted an AIC member telling them that they have been randomly selected by PEXA to trial PEXA 5.6.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Phone call two: Scammers contacted an AIC member referring to an email sent two months ago from PEXA regarding security enhancements and asking for email addresses.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please note, a PEXA employee will never call you and ask for your e-mail address.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What to do&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you receive a call similar to the above or that you believe to be suspicious, please:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Ask for the caller’s full name&lt;/LI&gt;
&lt;LI&gt;Ask for the caller’s e-mail address&lt;/LI&gt;
&lt;LI&gt;Record the caller’s preferred phone number&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then, contact your Account Manager, PEXA Direct Specialist or PEXA’s security team at &lt;SPAN&gt;&lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/SPAN&gt; to alert them.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;It’s important that we continue to work together to defend against scammers, phishing attempts and/or cyber-fraud. Please reach out if you encounter any suspicious behaviour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aoife&lt;/P&gt;</description>
      <pubDate>Tue, 14 Aug 2018 01:44:56 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Member-security-alert-phone-scam/m-p/11702#M1</guid>
      <dc:creator>Aoife</dc:creator>
      <dc:date>2018-08-14T01:44:56Z</dc:date>
    </item>
    <item>
      <title>Using your PEXA login credentials and Digital Certificates</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Using-your-PEXA-login-credentials-and-Digital-Certificates/gpm-p/11647#M37</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 999px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/3912i69A0D04BDA364DEE/image-size/large?v=1.0&amp;amp;px=999" alt="Email_Banner_Security.jpg" title="Email_Banner_Security.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This checklist will help you protect your identity and the integrity of the network when using your PEXA login credentials and Digital Certificate to electronically sign in PEXA.&lt;/P&gt;
&lt;P&gt;Following the steps below will help you remain compliant with your professional obligations, and those set out in the Model Participation Rules which govern your use of PEXA. Non-compliance with these obligations may result in the Registrar of Titles in your jurisdiction instructing PEXA to suspend or terminate your access to the network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Ensure you are the only person who knows your PEXA password&lt;/FONT&gt;&lt;/H3&gt;
Upon registering with PEXA, unique credentials are provided to an organisation’s nominated Subscriber Manager. If required, the Subscriber Manager can then create individual user profiles with unique login details for additional employees within their organisation. Employees should never share User IDs or password login details for PEXA.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Select different passwords for your email, desktop access and PEXA&lt;/FONT&gt;&lt;/H3&gt;
Using the same password across multiple log in channels is risky - if one was compromised, then all could be compromised. Strong passwords have a minimum of 10 characters and use a mix of uppercase and lowercase letters, numbers and special characters like &lt;STRONG&gt;!&lt;/STRONG&gt;, &lt;STRONG&gt;&amp;amp;&lt;/STRONG&gt;, and &lt;STRONG&gt;*. #&lt;/STRONG&gt; (Using a special character in your password will increase the difficulty of breaking it significantly).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Ensure each employee required to sign documents and authorise funds in PEXA has their own Digital Certificate&lt;/FONT&gt;&lt;/H3&gt;
Every Subscriber is required to obtain and maintain at least one Digital Certificate. The number required will depend on how many people will be signing on behalf of the organisation. Digital Certificates are assigned to an individual – when used to digitally sign, both the signer and organisation are clearly identifiable. If your Digital Certificate is shared within your firm and misused in a PEXA transaction, you will be identifiable as the signer.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Ensure no one else has access to your Digital Certificate and PIN&lt;/FONT&gt;&lt;/H3&gt;
Your Digital Certificate is your unique, binding electronic signature. If a digitally signed document in a PEXA transaction is called into question, and it is suggested that the owner of the Digital Certificate was not the person who applied it, your professional reputation and ability to claim on your professional indemnity insurance could be impacted. Whenever your digital signature is applied in PEXA, it is taken to be signed by you and is binding, similar to a ‘wet’ signature. It is important to check documents and the Financial Settlement Schedule prior to signing. Should someone other than the owner of a Digital Certificate use it to sign in PEXA, it may be considered the equivalent of forging a ‘wet’ signature. We suggest you do not leave it inserted in your computer, and instead consider locking it away and ensure secure storage provisions are available for all employees with a Digital Certificate.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Plan ahead to ensure your business has sufficient coverage to sign in PEXA&lt;/FONT&gt;&lt;/H3&gt;
Consider how many people in your organisation may be required to digitally sign in PEXA and arrange Digital Certificates for each unique user. When managing operations, you may need to account for staff leave, those who are frequently out of the office, and ensuring there are enough people present who are trained and authorised to sign in PEXA.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Know what to do if you or a staff member move on to a new job&lt;/FONT&gt;&lt;/H3&gt;
A Digital Certificate identifies both you and the firm, therefore cannot be taken by the owner to a new job. A new Digital Certificate will need to be ordered by their new employer. In these circumstances, Digital Certificates must be cancelled by calling the PEXA Support Centre on &lt;STRONG&gt;1300 084 515&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;FONT color="#87317c"&gt;Multi-factor authentication (MFA)&lt;/FONT&gt;&lt;/H3&gt;
MFA is utilised to confirm that the person logging in to PEXA is the person who owns the profile being used, and not someone else. MFA requires the user to provide two or more types of evidence to verify their identity when logging in to an account or completing a transaction. As MFA requires the owner of the profile to pair their mobile phone, logging in requires the user to have their device on them, enabling them to receive their authentication code by SMS or the PingID app directly. It’s important to note that each Subscriber will be required to authenticate with their own device every 12 hours.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 10 Aug 2018 01:45:18 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Using-your-PEXA-login-credentials-and-Digital-Certificates/gpm-p/11647#M37</guid>
      <dc:creator>cbrown</dc:creator>
      <dc:date>2018-08-10T01:45:18Z</dc:date>
    </item>
    <item>
      <title>Talking to consumers about the security of e-Conveyancing</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Talking-to-consumers-about-the-security-of-e-Conveyancing/gpm-p/11003#M35</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;We've had a&amp;nbsp;few&amp;nbsp;questions on how to&amp;nbsp;talk to consumers&amp;nbsp;about the security of e-Conveyancing. Here's&amp;nbsp;some&amp;nbsp;talking points that might assist when having these conversations with your customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can discuss your personal experience transacting through&amp;nbsp;PEXA and point out that over a million transactions have taken place on the platform safely without issue or interference.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Over 1.2 million transactions have been successfully processed through the platform, and over $150 billion in property value settled.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Provide&amp;nbsp;your&amp;nbsp;customers the assurance that your business has good cyber security measures in place&amp;nbsp;and that the PEXA platform itself is incredibly secure.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;As your representative, I must physically sign off on the account details using my own digital signing certificate and password before a payment can be processed. If the details of any such payment change prior to a settlement proceeding in PEXA, I am required to re-sign before settlement can take place. I always check to make sure that the details are accurate immediately prior to digitally signing the settlement schedule.&lt;/LI&gt;
&lt;LI&gt;PEXA’s Information Security Management System (ISMS) aligns with the international security standard ISO27001 – protecting PEXA’s platform against online cyber security threats. Importantly, this is an e-Conveyancing regulator (&lt;A href="https://www.arnecc.gov.au/" target="_blank"&gt;ARNECC&lt;/A&gt;) requirement as well as a PEXA cyber security measure.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;In addition, the ISMS is independently audited – currently by Ernst &amp;amp; Young (EY) – each year.&amp;nbsp; Independent reviews ensure PEXA’s cyber security is fit for purpose and up to date. All review outcomes and recommendations are shared with PEXA’s regulator, ARNECC. The results of the audit demonstrate that PEXA has consistently complied with the international security standard.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can tell your customers that as a result of the most recent events there have been extra security measures put in place by PEXA&amp;nbsp;to&amp;nbsp;reduce the risk of this type of fraud happening in the future.&lt;/P&gt;
&lt;P&gt;And, of course, letting them know if it does occur, PEXA is&amp;nbsp;implementing a residential sellers guarantee to cover the lost funds.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;To further protect us (lawyers and conveyancers), PEXA has also introduced extra security measures to protect against a recurrence of this incident. This includes:&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;Increased monitoring of PEXA Workspaces&lt;/LI&gt;
&lt;LI&gt;Creation of new users in an ‘inactive’ state, pending PEXA activation after verification&lt;/LI&gt;
&lt;LI&gt;Providing Workspace time stamps&lt;/LI&gt;
&lt;LI&gt;Introduction of multi-factor verification&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;PEXA has also recently announced&amp;nbsp;a residential seller guarantee, safeguarding all transactions that occur on their platform.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 12 Jul 2018 23:29:43 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Talking-to-consumers-about-the-security-of-e-Conveyancing/gpm-p/11003#M35</guid>
      <dc:creator>TJ</dc:creator>
      <dc:date>2018-07-12T23:29:43Z</dc:date>
    </item>
    <item>
      <title>Email impersonation fraud – reassurance for Lawcover insured lawyers</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Email-impersonation-fraud-reassurance-for-Lawcover-insured/gpm-p/10780#M32</link>
      <description>&lt;P&gt;Lawcover have provided reassurance to their customers regarding email impersonation fraud, please find below their full pdf.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"The recent email fraud incident identified by PEXA has caused a number of lawyers to contact Lawcover to understand their insurance coverage.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The email fraud referred to has been a risk for some time and is one about which Lawcover has repeatedly warned law practices to be aware. Our message remains the same irrespective of the method of funds transfer – be aware and prepared for the risks of email impersonation fraud and follow steps to protect yourself from becoming a victim or an unwitting participant in a fraudulent activity.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;While individual matters will of course depend on the facts of the case and the terms and conditions of the relevant policy, the following should provide some reassurance about the extent of your insurance coverage as a Lawcover insured.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;"&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 01:24:08 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Email-impersonation-fraud-reassurance-for-Lawcover-insured/gpm-p/10780#M32</guid>
      <dc:creator>TJ</dc:creator>
      <dc:date>2018-06-29T01:24:08Z</dc:date>
    </item>
    <item>
      <title>Security Advisory - New Malware could be Infecting your Home Modem/Router Devices</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Security-Advisory-New-Malware-could-be-Infecting-your-Home-Modem/gpm-p/10000#M29</link>
      <description>&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;U&gt;&lt;STRONG&gt;Security Advisory&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every now and again we come across security issues that can impact you at home. There is one that is making some noise in the security world. The new virus/malware discovered can infect your home or small business router (the box that connects to the Internet). It’s called “VPNFilter” and the estimated number of infected devices is around 500,000; in at least 54 countries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Read on to see if this affects your internet box (router/modem) and what to do to protect yourself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#000080"&gt;&lt;STRONG&gt;1&lt;/STRONG&gt;.&amp;nbsp;&lt;/FONT&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;How does this affect you?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you have a router/modem from the following companies, it’s suggested you review your vendor’s update steps.&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Vendor&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Action to take&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Telstra&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;No action – Telstra reports that your modem is updated automatically&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Linksys&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://community.linksys.com/t5/Wireless-Routers/VPNFilter-Malware-Update/td-p/1315372" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Netgear&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://kb.netgear.com/000058814/Security-Advisory-for-VPNFilter-Malware-on-Some-Routers" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;MikroTik&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://forum.mikrotik.com/viewtopic.php?f=21&amp;amp;t=134776&amp;amp;sid=e1317ac312b35b2f791df77e6d9a6404" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;TP-Link&lt;BR /&gt;(TP-R600VPN model only)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://www.tp-link.com/us/faq-2212.html" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;QNAP Systems &lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Follow the vendor &lt;A href="https://www.qnap.com/en/security-advisory/NAS-201805-24" target="_blank"&gt;directions&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;2.&amp;nbsp;&lt;FONT size="3"&gt;Can I learn more about the VPNFilter issue?&lt;/FONT&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you would like to get into the details, follow this link (&lt;A href="https://blog.talosintelligence.com/2018/05/VPNFilter.html" target="_blank"&gt;https://blog.talosintelligence.com/2018/05/VPNFilter.html&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;FONT color="#000080"&gt;&lt;STRONG&gt;&amp;nbsp; 3. &lt;FONT size="3"&gt;Is there anything we can do to be secure?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;A few helpful tips to keep your home devices secure are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Always change the default password.&lt;/LI&gt;&lt;LI&gt;Put a password on your home wireless network.&lt;/LI&gt;&lt;LI&gt;Use a strong password with at least 8 characters, a combination of upper and lower case, include numbers and special characters such as @, #,and !.&lt;/LI&gt;&lt;LI&gt;Use a different password on your PC, to your email, to your work, and so on.&lt;/LI&gt;&lt;LI&gt;Make sure you update your software regularly so that security patching occurs.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you still have questions, email &lt;A href="mailto:security@pexa.com.au" target="_blank"&gt;security@pexa.com.au&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 May 2018 23:09:27 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Security-Advisory-New-Malware-could-be-Infecting-your-Home-Modem/gpm-p/10000#M29</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-05-30T23:09:27Z</dc:date>
    </item>
    <item>
      <title>Five steps to protect yourself by LPLC</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Five-steps-to-protect-yourself-by-LPLC/gpm-p/9647#M27</link>
      <description>&lt;P&gt;Hi community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.scamwatch.gov.au/news/stop-and-check-is-this-for-real-scams-awareness-week-2018" target="_blank"&gt;Scams Awareness Week&lt;/A&gt;&lt;/STRONG&gt; runs this week from 21 – 25 May 2018 and the Australian Government is urging Australians to be on the lookout for threat-based impersonation scams by taking a moment to ask ‘is this for real?’&lt;/P&gt;
&lt;P&gt;I thought you might be interested in the following article &lt;A href="http://digitalfinanceanalytics.com/blog/australians-lost-340-million-to-scammers-in-2017/" target="_blank"&gt;Australians Lost $340 million to scammers in 2017&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also found a helpful resource on LPLC's website about &lt;A href="https://lplc.com.au/risk-management/cyber-security-2/cyber-fraud-dont-fall-for-it/" target="_blank"&gt;cyber fraud&lt;/A&gt;.&amp;nbsp;&amp;nbsp;There's also a downloadable poster which I've attached to this post (link below). It covers 'Five steps to protect yourself'. It would be worthwhile printing for your offices as a reminder.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" style="width: 529px;"&gt;&lt;img src="https://nvfdb67842.i.lithium.com/t5/image/serverpage/image-id/3535iBA2DA679681763B3/image-size/large?v=1.0&amp;amp;px=999" alt="cyber-security.PNG" title="cyber-security.PNG" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 May 2018 01:01:26 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Five-steps-to-protect-yourself-by-LPLC/gpm-p/9647#M27</guid>
      <dc:creator>AnnaHardie</dc:creator>
      <dc:date>2018-05-21T01:01:26Z</dc:date>
    </item>
    <item>
      <title>Security Reminder - Confirming client bank details</title>
      <link>https://community.pexa.com.au/t5/Security-Updates/Security-Reminder-Confirming-client-bank-details/m-p/9644#M2</link>
      <description>&lt;P&gt;PEXA is aware of phishing attempts outside the PEXA platform where unknown parties are intercepting emails between practitioners and their clients and fraudulently changing customer bank details which may result in the unwitting misdirection of funds.&lt;BR /&gt; &lt;BR /&gt;While not specific to e-Conveyancing, PEXA urges all practitioners to take steps to reduce the risk of fraud. This includes verbally confirming bank account details with your clients before entering them into the settlement schedule (if completing the transaction electronically).&lt;BR /&gt; &lt;BR /&gt;It may not be sufficient to simply confirm with the client that they have sent you an email with their bank account details. It would be appropriate to read the bank account details out to your client, confirming that the information you have received is the same as what the client intended to send.&lt;BR /&gt; &lt;BR /&gt;The Law Institute of Victoria offers a practical guide covering cyber security which we would encourage you to &lt;A href="https://www.liv.asn.au/getattachment/Professional-Practice/Areas-of-Law/Technology-and-the-Law/Resources/20171122_LP_LawTechEssentials_CyberSecuirtyFirms-v02.pdf.aspx?mkt_tok=eyJpIjoiT0RrME5UazNaak5pTWpabCIsInQiOiJZOE9GZzdMYkdlbUwwbnlDSDZCQXlySTZcL2FpVEkrYUY5ZVZHK1ZyYmZucGlONW1ZOU1mMm9zQm5PNXFiOW96K3BvdFwvY3JoXC9KY2NsVWZZUDNTXC91QXJWQU5GRjVXY0dBbEIwb1wvVTY2STZiQURnaklaalZjOVNtQTM4VlB1ZDNvIn0%3D" target="_blank"&gt;read&lt;/A&gt;. In addition, The Queensland Law Society has also published a warning in relation to email &lt;A href="http://www.qls.com.au/About_QLS/News_media/News/Warning_on_new_email_scam?mkt_tok=eyJpIjoiT0RrME5UazNaak5pTWpabCIsInQiOiJZOE9GZzdMYkdlbUwwbnlDSDZCQXlySTZcL2FpVEkrYUY5ZVZHK1ZyYmZucGlONW1ZOU1mMm9zQm5PNXFiOW96K3BvdFwvY3JoXC9KY2NsVWZZUDNTXC91QXJWQU5GRjVXY0dBbEIwb1wvVTY2STZiQURnaklaalZjOVNtQTM4VlB1ZDNvIn0%3D" target="_blank"&gt;scams&lt;/A&gt;. &lt;BR /&gt; &lt;BR /&gt;If you have any questions or concerns regarding an existing transaction, or guidance on how to stay safe online, please contact the PEXA Support Centre on 1300 084 515 or visit the security page on our &lt;A href="https://www.pexa.com.au/security?mkt_tok=eyJpIjoiT0RrME5UazNaak5pTWpabCIsInQiOiJZOE9GZzdMYkdlbUwwbnlDSDZCQXlySTZcL2FpVEkrYUY5ZVZHK1ZyYmZucGlONW1ZOU1mMm9zQm5PNXFiOW96K3BvdFwvY3JoXC9KY2NsVWZZUDNTXC91QXJWQU5GRjVXY0dBbEIwb1wvVTY2STZiQURnaklaalZjOVNtQTM4VlB1ZDNvIn0%3D" target="_blank"&gt;website&lt;/A&gt;.&lt;BR /&gt; &lt;BR /&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 May 2018 00:47:23 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Security-Updates/Security-Reminder-Confirming-client-bank-details/m-p/9644#M2</guid>
      <dc:creator>JoW</dc:creator>
      <dc:date>2018-05-18T00:47:23Z</dc:date>
    </item>
    <item>
      <title>Phishing Emails... How to stay away from it...</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-How-to-stay-away-from-it/gpm-p/8784#M22</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is an example of an actual phishing email for awareness purposes. Please take a moment to look at the pointers to understand how you can be misguided by a hacker. Being on top of this can help you to stay safe online.&amp;nbsp;Remember, one click is all that matters to open the door to whole new level of issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://home.pexa.io/download/attachments/35243618/phishing-email-signs%20Paypal.jpg?version=1&amp;amp;modificationDate=1523495744947&amp;amp;api=v2" border="0" alt="phishing-email-signs Paypal.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="columnLayout two-equal"&gt;&lt;DIV class="cell normal"&gt;&lt;DIV class="innerCell"&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Here are few helpful steps and questions to try/ask yourselves before clicking on any suspicious/unknown email.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reputable &amp;amp; legitimate organizations:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't request your sensitive information via email&lt;/STRONG&gt;&amp;nbsp;- Legitimate organisations do not send you emails asking you to download certain content e.g. utility bills, gift card link etc. or request you to verify your account details by clicking on a link.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't call or address you by a common greeting -&lt;/STRONG&gt;&amp;nbsp;Most of the time it will not include generic greetings e.g. "PayPal User", unless it’s advisory and openly available information.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Have their own email domains&lt;/STRONG&gt;&amp;nbsp;- Don't just look at the person's name sending the email. Check the full email address including the domain to make sure it is actually from the organisation represented, as most of the time they'll have their own domain. Hover your mouse over the email to verify this and make sure there's no additional numbers or special characters attached to the address. If there are, it is most likely a phishing e-mail.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't make grammatical errors -&amp;nbsp;&lt;/STRONG&gt;Spelling mistakes and bad grammar are key giveaways that it's phishing.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don’t force you to their website -&lt;/STRONG&gt;&amp;nbsp;Most of the phishing emails contain multiple hyperlinks to maximize their chances of you clicking on one of them.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Don't send unsolicited attachments in the emails -&lt;/STRONG&gt;&amp;nbsp;Attractive attachment headings are another giveaway that it is a phishing scam. Another common case is utility bills or any other public event happening around the same time. Scammers use these events or news items to grab your attention and potentially to get you click on the links.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Send legitimate URLs&amp;nbsp;&lt;/STRONG&gt;- It may look like it is but it may send you somewhere else. Hover your mouse on the link (do not click) to check the link is actually legitimate and does not represent a different suspicious name. Always type the URL into your browser rather than using links on emails if you want to access the website. Don’t trust the email, instead call the sender to validate the request.&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="cell normal"&gt;&lt;DIV class="innerCell"&gt;&lt;P&gt;&lt;SPAN class="confluence-embedded-file-wrapper confluence-embedded-manual-size"&gt;&lt;IMG src="https://home.pexa.io/download/attachments/35243618/download.jpg?version=1&amp;amp;modificationDate=1523495744925&amp;amp;api=v2" border="0" height="400" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="columnLayout single"&gt;&lt;DIV class="cell normal"&gt;&lt;DIV class="innerCell"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;I clicked on it... Now what happens?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you click on a phishing link accidentally, it does certain actions behind the scenes which you cannot see. These actions could be anything from a simple add popup on your screen to a stealing of your personal/customer data.&amp;nbsp;So, if you fall into this category, speak up and seek help by contacting your internal security&amp;nbsp;professionals or IT partners. Sending phishing emails and inviting people to click on these links are by far the most successful way for organisations to experience data breaches.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;if you find any phishing/spam material referring to PEXA, please forward it to &lt;FONT color="#0000FF"&gt;security@pexa.com.au&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 17 Apr 2018 00:30:28 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-How-to-stay-away-from-it/gpm-p/8784#M22</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-04-17T00:30:28Z</dc:date>
    </item>
    <item>
      <title>Overseas login to PEXA</title>
      <link>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Overseas-login-to-PEXA/m-p/8535#M5</link>
      <description>&lt;P&gt;I am going on leave for 2 weeks and have 2 PEXA settlements due while I am away.&amp;nbsp; Is there any limitation on logging in to PEXA from an overseas location?&amp;nbsp; I ask because some sites, such as ASIC, will not allow login from outside Australia.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously I need to take my Licence key with me, but is there any other issue you can think of?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 00:57:07 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Raise-a-Security-Concern/Overseas-login-to-PEXA/m-p/8535#M5</guid>
      <dc:creator>SRJ</dc:creator>
      <dc:date>2018-04-09T00:57:07Z</dc:date>
    </item>
    <item>
      <title>Phishing Emails referring to PEXA</title>
      <link>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-referring-to-PEXA/gpm-p/7964#M21</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;FONT color="#3366FF"&gt;&lt;STRONG&gt;Forwarding suspicious emails to security@pexa.com.au&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have made changes to our security configurations when you forward a phishing/suspicious email to PEXA via security@pexa.com.au&lt;/P&gt;&lt;P&gt;Previously when you forward an email to security@pexa.com.au with potential malicious content it denied successful delivery and often you would have received a delivery fail/bounce back message. But not any more.... Now you can click the forward button on the actual malicious/phishing email and send directly to us via security@pexa.com.au without the email being blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is important members forward us the actual email to PEXA instead of trying to send it as PDF or a Screenshot of the email.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PEXA Cyber Security Team&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 21:34:22 GMT</pubDate>
      <guid>https://community.pexa.com.au/t5/Online-Security/Phishing-Emails-referring-to-PEXA/gpm-p/7964#M21</guid>
      <dc:creator>IndikaWimalasiri</dc:creator>
      <dc:date>2018-03-07T21:34:22Z</dc:date>
    </item>
  </channel>
</rss>

