News

Most Recent

‘Irma’ Sites Spike

MS-ISAC has noticed a registration of over 743 domain names including the phrase “Irma “in the past few weeks. These new domains contain other words such as help, relief, victims, recover, claims and lawsuits. We all need to be cautious in the next few months of emails, any links or visiting websites pertaining to Irma. […]

Read more

Patch your Droid today!

According to a recent Cybersecurity Advisory from the Multi-state Information Sharing and Analysis Center (MS-ISAC), “Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution” MS-ISAC OVERVIEW: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution. Android is an […]

Read more

IRS & FBI Themed Ransomware Attack

The IRS issued a warning on a FBI and IRS ransomware scam taking computer data hostage.  The scam uses the IRS and FBI crests.  The letter asks the user to complete the questionnaire and click the “here”  link.  This link will download a ransomware that will prevent the user from accessing data stored on their […]

Read more

Hurricane Harvey Charity Scam

Cyber scammers are using the Hurricane Harvey disaster to trick people to click on links on Facebook, Twitter and phishing emails. Some Examples to watch out for: Facebook pages dedicated to victim relief that contain links to scam websites. Tweets are going out with links to charitable websites soliciting donations, but in reality include links […]

Read more

Employees Pose a Greater Risk

While cyber criminals receive a lot of attention and generate headlines, the threat coming from within an organization, whether malicious or not, may be greater. Employees and contractors that are provided access to a company’s network infrastructure without proper risk management training, can have a significant risk to businesses.  Many cyber-security breaches are due to […]

Read more

Vulnerabilities in Google Chrome

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of the most severe of […]

Read more

Mystery Shopping Scam

Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interests. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then gets you roped into […]

Read more

CASE STUDY: Kronick Kalada Berdy & Co.

At Site2, our engineers have been on the front lines of the unfolding Ransomware-as-a-Service trend. Reports have suggested that resulting Ransomware attacks have increased over 500% in 2016, with over 1,000 attacks a day and 40% of businesses affected. The attached case study provides some insight into the story of one of our clients that […]

Read more