Search Results for "Fake Tech Support"


  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Don’t fall for fake Equifax settlement sites, warns FTC Equifictitious sites popped up within days of Equifax agreeing to pay up to $700m to settle claims over the 2017 data breach. Canadian Centre for Cyber Security Rele...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Hacked tornado warning systems leave Texans in the dark Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents. You left WHAT on that USB drive?! Nudies, taxes, and me...
  • Cybersecurity Basics
    It’s April Fools Day, and in honor of those people who are still trading away safety for convenience when working with a computer or online, we have a short list of simple and basic security methods.  If you are someone who provides “tech support” for a family member or are the &#...
  • Irainian Phishing Campaign Attempts to Bypass 2FA
    A new phishing campaign by the Iranian state-sponsored group known as “Charming Kitten” is using new tactics to trick users out of their passwords and both SMS and app generated two-factor codes.  Charming Kitten is tied to the Islamic Revolutionary Guard.  This campaign has been ongoi...
  • Weekend Update
    A quick Saturday digest of cybersecurity news articles from other sources. Warn your friends they can’t bypass Facebook with this hoax No, none of us can “bypass” Facebook’s newsfeed algorithms by copy-pasting our way past them.  I have friends and relatives that are trying to ...
  • Russian Active Measures for the Internet Age.
    Is Donald Trump Putin’s Revenge? Was the election of Donald Trump the result of the successful application of “active measures” by Russia? Did the massive Facebook and Twitter campaigns by the Russians change public opinion enough in the final days of the Presidential campaign to move...
  • Are The Russians Really Attacking Us?
    It seems that hardly a week goes by without some new cyber-attack being attributed to Fancy Bear, Cozy Bear, Grizzly Steppe, or some other cute-sounding Russian hacker collective.  One the one hand, we have the DHS, FBI, and US-CERT attributing these attacks to the Russians.  There are others, inc...
  • Two Easy Ways To Breach Company Networks
    Bad news – your small business network is easy for an attacker to access, and for most of you there are two or more exploitable attacker vectors.  A recent report from Positive Technologies analyzed the results of 22 penetration tests on companies from finance, transportation, retail, and eve...
  • Protect Yourself From Cyber Scams – Part 2
    In our last post we looked at common web and phone based scams that I have seen personally, or have been targeted at a client.  Today we will examine other scams that are popular with cyber-criminals. Some of these are targeted at specific industries or at people in positions of leadership or owner...
  • Protect Yourself From Cyber Scams – Part 1
    I cannot believe the number of scam calls and emails I receive in a given day.  Often I get 4 or 5 scams calls on my cell phone, and a few more on my landline.  That landline has got to go, more than 90% of calls on that number are from scammers or telemarketers.  Emails are even more numerous, a...
Page 9 of 11 «...7891011