News

Most Recent

“Fake-tortion” Attacks

There is a new, sophisticated email scam you need to watch out for. The sophisticated attackers are targeting potential victims in an email sequence that starts with pornography and adult dating links, which are then followed up with extortion attempts. IT security company Forcepoint says it picked up more than 33,500 such emails in August, […]

Read more

‘Irma’ Sites Spike

MS-ISAC has noticed a registration of over 743 domain names including the phrase “Irma “in the past few weeks. These new domains contain other words such as help, relief, victims, recover, claims and lawsuits. We all need to be cautious in the next few months of emails, any links or visiting websites pertaining to Irma. […]

Read more

Patch your Droid today!

According to a recent Cybersecurity Advisory from the Multi-state Information Sharing and Analysis Center (MS-ISAC), “Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution” MS-ISAC OVERVIEW: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution. Android is an […]

Read more

IRS & FBI Themed Ransomware Attack

The IRS issued a warning on a FBI and IRS ransomware scam taking computer data hostage.  The scam uses the IRS and FBI crests.  The letter asks the user to complete the questionnaire and click the “here”  link.  This link will download a ransomware that will prevent the user from accessing data stored on their […]

Read more

Hurricane Harvey Charity Scam

Cyber scammers are using the Hurricane Harvey disaster to trick people to click on links on Facebook, Twitter and phishing emails. Some Examples to watch out for: Facebook pages dedicated to victim relief that contain links to scam websites. Tweets are going out with links to charitable websites soliciting donations, but in reality include links […]

Read more

Employees Pose a Greater Risk

While cyber criminals receive a lot of attention and generate headlines, the threat coming from within an organization, whether malicious or not, may be greater. Employees and contractors that are provided access to a company’s network infrastructure without proper risk management training, can have a significant risk to businesses.  Many cyber-security breaches are due to […]

Read more

Vulnerabilities in Google Chrome

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of the most severe of […]

Read more

Mystery Shopping Scam

Bad guys are increasingly targeting you through your smartphone. They send texts that trick you into doing something against your own best interests. At the moment, there is a mystery shopping scam going on, starting out with a text invitation, asking you to send an email for more info which then gets you roped into […]

Read more