Sunday Funnies: Slow Drivers

imageMy plea (falling on deaf ears I suspect)

  1. If you are going to drive below the speed limit stay out of the left lane.
  2. Slow drivers please stay out of the center lane.  I get it, you are avoiding the merging traffic in the right line (cuz ...
Continue Reading →
0

FWD: Daily Report Email Scam

If you receive an email titled “Fwd: Daily Report” from a coworker this is a malware attack.  Clicking on the attachment not only launches the Trojan horse downloader, which automatically calls out to a malicious server to download more malware, but it also emails a copy of itself to everyone in your address book.  The details of the email are below:

Email subject: FW:Daily report
Attachment name: F44907162.zip
Body: Please review attached ...

Continue Reading →
0

Mail Returned as Undeliverable? What Happened To My Email Account?

This has happened to me a couple of times, and I always get panicked calls from clients when it happens to them.  All of a sudden your email inbox is flooded with undeliverable return email messages, sent to people you have never heard of.  Hundreds of them, spanning sometimes as much as a week’s time.  See below.

Has your email account been hacked?  Do you have to change your password?  In a word, NO.  You are merely the victim of “spoofing,” ...

Continue Reading →
0

9 New Year’s Resolutions–Cybersecurity Version

In 2015, I resolve to:

  • Back up my data – this means your work product, pictures, music and any other irreplaceable files stored on your hard drive.  Backup once to an external drive attached to your computer, and a second time to an online service such as our recommended solution, Carbonite.
  • Create longer and complex passwords (10 characters or more).  Long passwords take more time to crack using brute force methods.  A 7 character password can generally be cracked in a ...
Continue Reading →
0

Secure Your Android Phone

Image result for android logoAccording to a November 20th post in the New York Times Bits blog, Android phone users need to be protecting themselves from a sophisticated class of malware called NotCompatible.  This malware has been on the loose for a couple of years, and is installed either as a drive-by downloaded from an infected web page, or more recently as a “security patch” delivered ...

Continue Reading →
0

Best Job Sites for IT Pros

Let’s say one of your New Year’s Resolutions is to get a better job in 2015.  If you are an IT professional looking for your next employment opportunity, below is a short list of employments sites, many that specialize exclusively in information technology jobs.  For those of you who are looking at information security as a career move, be aware that there is a –7% unemployment rate in this sector.  That’s right, there are 7% more jobs than qualified applicants ...

Continue Reading →
0

Detecting Point of Sale Malware

Every day seems to bring a fresh report of yet another POS breach and the release of yet another batch of credit card numbers stolen by one of the variants of the BackOff point of sale exploit. You have to be asking yourself at this point why haven’t security companies been able to come up with a way to detect and remove this malware?  It has been around ...

Continue Reading →
0

How to Remove Government Sponsored Spyware

imageIn addition to the traditional malware problems that we face from the cyber-criminals that are after your computer, your money, and your identity, we are now faced with a similar threat from governments both foreign and domestic.  How do you know if your computer is under government surveillance? Software developer ...

Continue Reading →
0
Page 222 of 273 «...190200210220221222223224...»