Security

Interesting article on how WannaCrypt initial variant was stopped last week

By at 15 May, 2017, 9:59 am

The Malware Tech site has a very interesting article on how last weeks initial variant of the WannaCrypt ransomware attack was inadvertently stopped

Read More >>

Scam of the Week: Fake iCloud Emails “Phish” For Your Personal Info

By at 17 April, 2017, 9:22 am

According to the good folks over at KnowBe4.com: The bad guys are targeting Apple users with emails that appear to be coming from Apple and aim to trick unsuspecting users into handing over their personal information.

Read More >>

Scam of the Week – Insidious New IRS Social Engineering Attack

By at 10 October, 2016, 10:00 am

There is an insidious new IRS scam doing the rounds. They send you a phony IRS CP 2000 form and claim the income reported on your tax return does not match the income reported by your employer. This is meant to get you worried. To confuse you further, the bad guys claim this has something to do with the Affordable Care Act.

Read More >>

The one site about Ransomware you need to check out

By at 5 August, 2016, 1:05 pm

Ransomware. It’s what keeps me awake at night as a CIO and technologist. Also known as crpytoware, these malicious tools encrypt your data, delete or disable the ability to use built-in tools in your operating system to roll back to prior versions and then charge you money to provide you with a decryption key. And they just keep getting more and more sophisticated, with some even providing so called “help desks” to assist you in paying the ransom and decrypting your files….EVERYONE. Yes, I mean everyone! that deals with computers needs to have a basic understanding of ransomware.……

Read More >>

Locky Ransomware Infection is hitting end users!

By at 19 February, 2016, 4:05 pm

There is a nasty new ransomware infection called Locky that is running rampant currently. This malicious infection is being transmitted by Word documents attached to an email purporting to be an invoice. Check out the following articles and share them with your laweyrs and staff to advise them as to how this is being targeted and to avoid opening one of these emails. The articles include samples of the message and other important information.

Read More >>