Mail Returned as Undeliverable? What Happened To My Email Account?

This has happened to me a couple of times, and I always get panicked calls from clients when it happens to them.  All of a sudden your email inbox is flooded with undeliverable return email messages, sent to people you have never heard of.  Hundreds of them, spanning sometimes as much as a week’s time.  See below.

Has your email account been hacked?  Do you have to change your password?  In a word, NO.  You are merely the victim of “spoofing,” ...

Continue Reading →
0

9 New Year’s Resolutions–Cybersecurity Version

In 2015, I resolve to:

  • Back up my data – this means your work product, pictures, music and any other irreplaceable files stored on your hard drive.  Backup once to an external drive attached to your computer, and a second time to an online service such as our recommended solution, Carbonite.
  • Create longer and complex passwords (10 characters or more).  Long passwords take more time to crack using brute force methods.  A 7 character password can generally be cracked in a ...
Continue Reading →
0

Secure Your Android Phone

Image result for android logoAccording to a November 20th post in the New York Times Bits blog, Android phone users need to be protecting themselves from a sophisticated class of malware called NotCompatible.  This malware has been on the loose for a couple of years, and is installed either as a drive-by downloaded from an infected web page, or more recently as a “security patch” delivered ...

Continue Reading →
0

Best Job Sites for IT Pros

Let’s say one of your New Year’s Resolutions is to get a better job in 2015.  If you are an IT professional looking for your next employment opportunity, below is a short list of employments sites, many that specialize exclusively in information technology jobs.  For those of you who are looking at information security as a career move, be aware that there is a –7% unemployment rate in this sector.  That’s right, there are 7% more jobs than qualified applicants ...

Continue Reading →
0

Detecting Point of Sale Malware

Every day seems to bring a fresh report of yet another POS breach and the release of yet another batch of credit card numbers stolen by one of the variants of the BackOff point of sale exploit. You have to be asking yourself at this point why haven’t security companies been able to come up with a way to detect and remove this malware?  It has been around ...

Continue Reading →
0

How to Remove Government Sponsored Spyware

imageIn addition to the traditional malware problems that we face from the cyber-criminals that are after your computer, your money, and your identity, we are now faced with a similar threat from governments both foreign and domestic.  How do you know if your computer is under government surveillance? Software developer Claudio ...

Continue Reading →
0

FTC Takes Down Fake Telephone Support Operations

screen shot showing "errors" on computerYou are on your computer and get a pop-up telling you that your computer is horribly infected, and that you need to buy this special malware remover to fix your computer.  During the installation process you are told to call an 800 number to complete registration and activation.  $300 later, you have allowed the bad guys to install remote access software ...

Continue Reading →
0
Page 70 of 120 «...4050606869707172...»