- Phish & Tell
- Posts
- PHISH & TELL 032
PHISH & TELL 032
The Cybersecurity Brief for Women Who Mean Business
vgws
👋 WELCOME to Phish & Tell™️, from Security Done Easy™️
You’re not just building a business. | ![]() |
🎣 TOP CYBERSECURITY NEWS STORIES OF THE WEEK
Is it Friday, already?! 🫨 Let’s jump in!
Evil Twin Wi-Fi Hacker Jailed for Stealing Data Mid-Flight
Source: Hackread
What happened: An Australian man was sentenced to seven years and four months in prison after he used a portable hacking device to create “evil‑twin” Wi‑Fi hotspots on flights and in airports. These spoofed access points mimicked legitimate airline or airport Wi‑Fi networks, redirecting travellers to fake login pages where he captured credentials and even stole private photos and videos. After authorities seized his devices, evidence showed he accessed multiple women’s accounts without consent.
Why it matters: The case highlights the serious risks of connecting to untrusted public Wi‑Fi networks. It demonstrates how attackers can harvest sensitive data mid‑flight or in transit hubs by exploiting passengers’ trust.
What to do: Avoid connecting to unfamiliar or unsecured public Wi-Fi. If you must use public Wi-Fi, use a trusted VPN to encrypt your traffic. Disable automatic connections on your devices. Never enter credentials or sensitive data on login pages you weren’t expecting; instead, use your mobile carrier’s data or a personal hotspot when possible.E-tailer resumes sales 45 days after ransomware attack
Source: The Register
What happened: Japanese e-commerce company Askul took 45 days to partially recover its operations after a ransomware attack shut down its warehouse management system. The attack caused severe disruptions to both consumer and B2B services, prompted the company to switch to fax-based orders for essentials, and resulted in a data breach involving customer names and contact details.
Why it matters: This incident illustrates how ransomware can cripple a business’s operations for weeks, erode customer trust, and expose sensitive data. Even large retailers can struggle to resume normal operations.
What to do: Back up critical systems regularly and test restoration processes so you can recover quickly after an attack. Keep operating systems and security tools up to date. Implement multi-factor authentication (MFA) on all accounts. Finally, develop a ransomware incident response plan—including how you’ll communicate with customers—to minimize downtime..WordPress King Addons Flaw Under Active Attack
Source: The Hacker News
What happened: A critical vulnerability in the King Addons plugin for Elementor let attackers create administrator accounts on WordPress sites by specifying an admin role during registration. Active attacks have been recorded, and over 48,000 exploit attempts have been blocked.
Why it matters: More than 10,000 websites use this plugin. Unpatched sites are vulnerable to complete takeover—hackers could upload malware, redirect visitors, or steal data.
What to do: Update the King Addons plugin to the latest version (or remove it if unused). Audit your WordPress site for unfamiliar administrator accounts and change passwords. Enable two-factor authentication for all privileged users. Consider adding a security plugin that monitors for unauthorized changes and employ regular backups so you can restore your site if compromised.Not sure what applies to your business or what your options are? Let’s talk.
🔍 In Case You Missed It (ICYMI)
This week’s blog post: How to Cut Down Scam Calls for Good: A Practical Guide for Small Business Owners» In the past few months, I’ve heard many stories of loan scams, spoofed numbers, and aggressive manipulation tactics. It’s a growing problem, especially for small business owners who rely on inbound phone calls to run their companies. I break down what’s really going on — and what you can do (realistically) to cut these calls down without hurting your business.
Follow us on LinkedIn, Facebook or Instagram. Youtube is in the works (subscribe to get notified when I finally start getting these videos out there!)
🤖 The LOL-gorithm

🧷 THE SAFETY SNAP
With the holiday shopping season in full swing, criminals often deploy card skimmers at gas pumps, ATMs, and even self‑checkout terminals. These devices can look like part of the legitimate payment hardware but quietly capture your card’s magnetic stripe or chip data when you swipe or insert.
Why it matters: In the rush of holiday errands, it’s easy to overlook a tampered machine. Falling victim to a skimmer can lead to fraudulent transactions or identity theft, and the resulting hassles often take weeks to resolve.
What you can do to protect yourself:
Inspect before you insert: Look for loose card readers or keypads that feel off. Give them a wiggle—if they move or seem mismatched with the rest of the machine, choose another terminal or pay inside.
Choose secure terminals: When possible, use chip or contactless (tap) payments. Skimming devices usually target magstripe readers. Paying at staffed registers rather than unmanned kiosks also reduces risk.
Cover your PIN: Shield your hand when entering your PIN to prevent hidden cameras from capturing it.
Monitor statements: Check your bank and credit‑card statements regularly during the holiday season. Report suspicious charges immediately; many issuers offer zero‑liability protection if you act quickly.
Use mobile payments: Apple Pay, Google Pay, or other mobile wallets tokenise your card details, making it harder for skimmers to steal information.
By staying vigilant and following these simple steps, you can help ensure that your holiday shopping remains safe and free from hidden surprises.
💬 A PERSONAL NOTE
I caught the cold my kids had last week so my emotional support cat kept me company!

👂 TELL ME
Have you dealt with a cybersecurity incident? What would you share with your past self, if you could?
Stay safe and see you next week 🌟

You’re subscribed to Phish & Tell™️ because your business is worth protecting.
🩷
