Oh great! Your phones been infected. You cannot make calls, you get a text every 30 seconds telling you to pay someone 2 Bitcoin or else they will release photos… and Siri only tells you to turn left at the next stoplight. What happened? Why is your phone acting so weird? Is it just old? Did you download something? Are you infected? We will take some time to look through the mobile device threat landscape. A foggy foray that each...
For several years I have been telling people who have suffered a wire fraud incident to fill out a complaint at the Internet Complaint Crime Center (IC3.gov). When asked why the answer always came down to because the FBI asked. The act of filling out that complaint can feel like an exercise in futility; you do not get a complaint number, do not get any contact information, and you never hear anything about the progress. So why should you fill...
Traditional phishing is what we refer to as the “spray and pray” phishing attack because it’s usually a mass email that goes to thousands of individuals in hopes that a few will fall for the scam. Spear phishing targets specific individuals instead of a huge group and often research their victims on social media to customize their email. This is often the first step to get past a company’s defenses and then carry out targeted attacks on the company employees....
Mobile devices like laptops, smartphones, and tablets are everywhere. And the technology in these devices is advancing at an amazing rate. And as a result, to stay on top of the latest technology and most recent improvements, you may be replacing your devices every year or two. But do you ever think about all your personal data that is stored on each and every one of these devices before you get rid of it? Computers and smartphones aren’t the only...
“Malware, short for “malicious software,” includes any software (such as a virus, Trojan, or spyware) that is installed on your computer or mobile device. The software is then used, usually covertly, to compromise the integrity of your device. Most commonly, malware is designed to give attackers access to your infected computer. That access may allow others to monitor and control your online activity or steal your personal information or other sensitive data.” Most cybercrime starts with malware. Malware, short for...
It may be hard to think about any benefits from COVID, but more companies implementing work-from-home Policies is perhaps one of them. If you’re working from home, even temporarily, here are some things to keep in mind. Take something as simple as your daily commute. For many of us, “commute” now entails a short walk down the hallway. According to a report in Facility Executive, 88% of companies have now required their employees to work from home, and most experts...