- Ransomware (50)
- Cybercrime (77)
- Internet Safety (19)
- Best Practices (52)
- Downloading (2)
- Apps (11)
- Passwords (4)
- Identity Theft (8)
- Financial Aid (4)
- Spyware (5)
- Facebook (13)
- Social Media (15)
- Apple (11)
- Online Shopping (4)
- Amazon (2)
- Privacy (31)
- Phishing (64)
- MFA (5)
- LastPass (6)
- Hacking (2)
- Wi-Fi Networks (3)
- Malware (11)
- Security Awareness (81)
- Cybersecurity Careers (2)
- Breach (18)
- Spoofing (4)
- Fraud Prevention (3)
- Keylogging (3)
- Personal Identifiable Information (31)
- Catphishing (5)
- Microsoft (6)
- Mobile Device Management (6)
- Updates (3)
Officials are warning that scammers are exploiting California’s Coronavirus Contact Tracing program - The program that health workers use to call everyone who came in close contact with a COVID-19 patient.Continue Reading
Many of you know this already but some may not, Zoom has delayed the implementation of the waiting room and passcode changes announced back in June. The following quote is directly from a Zoom communication I received.
"While the majority of our customers have already secured their meetings with passcodes or waiting rooms, after hearing helpful feedback from those who haven't, we are extending the date for these security requirements to September 27th, 2020 to give you more time to prepare.
Please stay tuned for more information, we'll be rolling out training and collateral on waiting rooms and passcodes in July.
For more details, including a comprehensive FAQ document, please visit our support page."
Attacks compromising business email are increasingly targeting nonprofits, bilking them for gift cards instead of complicated wire transfers. Criminal hackers make a lot of money targeting businesses and institutions of all kinds with phishing attacks that lead to compromised business email. While crooks may have an array of systems in place to launder the funds they steal, researchers have noticed that so-called business email compromise scammers are leaning more and more on the humble gift card.
When Denise McKendry entered the Kroger store in Midlothian, Va., on Feb. 25, the schoolteacher was visibly distraught. She was on her cellphone, talking to a man who had identified himself as Officer Johnson from the IRS. He had explained, in threatening and sometimes nasty terms, that McKendry owed $5,207 in back taxes and that she’d be arrested if she did not pay it off. Fortunately, thanks to an arrangement among Google, the IRS and her local police department, she could easily make a down payment on her debt and avoid jail. All she had to do was buy two $500 Google Play gift cards and read their code numbers to him over the phone.
Watch out for any links texted to your Android phone promising an app to track coronavirus. Downloading the application will let snoops, suspected to be operating in Libya, watch you through your smartphone camera, listen to you through your microphone or pilfer all your text messages.
Cybercriminals and nation state-sponsored spies didn't take long to catch onto the coronavirus panic. Research released Thursday shows crooks and snoops have been rapidly registering vast numbers of potentially-malicious websites and sending out masses of scam emails as they try to make money from the pandemic.
A report from cybersecurity company Recorded Future noted a significant rise in website registrations related to the COVID-19 virus, some of which it believes are being used to either pilfer information from recipients or infect them with malware.
Denial of Service (DoS), ransomware, and financially-motivated data breaches were the winners in this year’s Verizon DBIR. Denial-of-service (DoS) attacks have spiked over the past year, while cyber-espionage campaigns have spiraled downwards. That’s according to Verizon’s 2020 Data Breach Investigations Report (DBIR) released Tuesday, which analyzed 32,002 security incidents and 3,950 data breaches across 16 industry verticals.
While people are focused on maintaining their physical and fiscal health, there's another threat they're likely not considering — a digital one. It should come as no surprise that cyber criminals are taking advantage of current events to profit, but companies and individuals need to do more to protect themselves. It's time to ramp up your cybersecurity efforts to protect your data and users.
The most common exploits against businesses are as follows:
- Phishing with crisis-related content
- Ecommerce fraud leveraging “in-demand” wholesale products
- Pandemic-related phone scams
CYBERSECURITY RESOURCES, BEST PRACTICES, AND ALERTS RELATING TO COVID-19
COVID-19 BRUIN RESOURCES & TOOLS AT ADMINVC WEBSITE
Although classes have temporarily transitioned to remote learning, campus remains open and research, health care, remote learning support and other business and operational support functions continue.
Transitioning to remote may be challenging and overwhelming in trying to establish security. Jon Lovitz, Jon calls in to talk to NINJIO Radio Host, Zack Schuler in a frenzy about working from home as a result of COVID-19. Zack walks Jon through the 5 Most Important Security Tips you should follow when working from home on your own devices.