Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Why We Don’t Do Product Endorsements

Chef’s Special: Spoofing SharePoint Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, ...

Continue Reading →
0

Guest Post – Mac Threats Are On The Rise

In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.

For the first time, cyberthreats targeting Mac devices have outpaced those targeting Windows machines. In 2018, there was an average of 4.8 threats detected per Mac endpoint. In ...

Continue Reading →
0

What Security Advice Do The Experts Offer?

I recently read an article from Heimdal Security about online safety.  In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure.  The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals.  The original article is here.

What I found interesting were ...

Continue Reading →
0

Security Issue With CCleaner

Piriform’s CCleaner is a popular computer cleaning and optimizing product that many people use.  I have my doubts about the real effectiveness of these utilities, but many of my clients swear by it.  I have used CCleaner myself several times as one of the tools I used to clean up a malware infection.

Recently, the CCleaner software code was modified  to include a malicious backdoor.  This warning was published earlier in ...

Continue Reading →
0

The Economics of the Tech Support Scam

We have reported a few times about the tech support scammers who use cold-calling phone lists or browser pop-ups with 800 number “support” lines to trick people into paying $300 or more for “malware removal” and other services that the computer doesn’t need.  And the pop-ups can be scary and convincing as in the example image.

Naked Security recently reported on the work ...

Continue Reading →
0

Retailing Hall of Shame – Office Depot Tech Support Scam

office-depotIt was recently reported in Naked Security that a Seattle television news crew interviewed an Office Depot employee who alerted them to the practice of selling in-store repair scams to customers who came in looking for computer help.  This whistle-blower told a story where employees where encouraged and even pressured to run the chain’s “PC Health Check” on evey ...

Continue Reading →
0

Does Your Computer Have A Malware Infection?

malwareToday we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.

Visual Symptoms

These are signs that you will see on your computer display, and are the most obvious symptoms.

  • Ransomware  – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
  • Fake Security Pop-Up – I ...
Continue Reading →
0

Important Alert for Lenovo Owners

Lenovo-logoA rare Tuesday post, but this is too important to wait.  If you own a Lenovo computer, you need to uninstall the Lenovo Accelerator application.  A recent security advisory from Lenovo reveals that the Accelerator application can allow an attacker to access Lenovo computers

“A vulnerability was identified in the Lenovo Accelerator Application software which could lead to exploitation by an attacker ...

Continue Reading →
0

Password Strategy Part 2

password1In our last article we recommended a publication from the GCHQ on passwords, and today we continue that discussion.  Many of the recommendations are suggestions we have covered before in previous posts, but the importance of having secure password procedures can not be overstated.

Change all default passwords

All of our network connected devices come “ready to go” right out of the box in ...

Continue Reading →
0
Page 1 of 2 12