- Ransomware (50)
- Cybercrime (77)
- Internet Safety (19)
- Best Practices (52)
- Downloading (2)
- Apps (11)
- Passwords (4)
- Identity Theft (8)
- Financial Aid (4)
- Spyware (5)
- Facebook (13)
- Social Media (15)
- Apple (11)
- Online Shopping (4)
- Amazon (2)
- Privacy (31)
- Phishing (64)
- MFA (5)
- LastPass (6)
- Hacking (2)
- Wi-Fi Networks (3)
- Malware (11)
- Security Awareness (81)
- Cybersecurity Careers (2)
- Breach (18)
- Spoofing (4)
- Fraud Prevention (3)
- Keylogging (3)
- Personal Identifiable Information (31)
- Catphishing (5)
- Microsoft (6)
- Mobile Device Management (6)
- Updates (3)
Officials are warning that scammers are exploiting California’s Coronavirus Contact Tracing program - The program that health workers use to call everyone who came in close contact with a COVID-19 patient.Continue Reading
Many of you know this already but some may not, Zoom has delayed the implementation of the waiting room and passcode changes announced back in June. The following quote is directly from a Zoom communication I received.
"While the majority of our customers have already secured their meetings with passcodes or waiting rooms, after hearing helpful feedback from those who haven't, we are extending the date for these security requirements to September 27th, 2020 to give you more time to prepare.
Please stay tuned for more information, we'll be rolling out training and collateral on waiting rooms and passcodes in July.
For more details, including a comprehensive FAQ document, please visit our support page."
The Toronto man had been temporarily laid off from his job in the telecom industry when the COVID19 crisis hit, so when he saw a job posting on LinkedIn on June 20 for a key account coordinator at Sobeys, he decided to apply.
"I want to work," said Monize, 54. "Sitting at home and doing little projects, it doesn't do well for me. I wasn't brought up that way."
Michael Klepper and Don Heatley of the AT&T Chief Security Office discuss scams involving contact tracing.
- The novel coronavirus is changing how Americans work. Some employers advise, “Stay home.”
- Working from home could increase cybersecurity risks. Tech protection can help.
- Tools like VPNs can help protect data and online connections, but workers may need to adapt in other ways.
- Scam alert: Coronavirus-related phishing emails aim to trick staffers with fake company policies.
That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family, including contact numbers, photos and locations. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on the go.
Whether you make financial transactions on your phone, scroll through photos on your tablet, or check email on your smartwatch, you probably spend a huge amount of time every day on your mobile device. While you probably know how to keep your computer secure, protecting your phone and tablet requires a different approach. Follow these six steps to help keep your mobile device secure.
Seems like everywhere you turn, there’s news of another mobile security breach. Just last month, vulnerabilities in iOS 9.3.5 were being exploited by the notorious NSO Group, maker of surveillance software, to read text messages and emails, record sounds, collect passwords, and even track the calls and whereabouts of users. Apple released a security patch on August 25 in response.
The following guidelines should be referenced to help facilitate remote work securely for faculty and staff members. Circumstances may vary depending on technical requirements of the remote work and should be used in addition to any specific requirements defined by local management or IT units.
The following basic security requirements meet UCLA’s Security Policy 401 on Campus Minimum Security Standards; These security standards consist of having up-to-date patches for the Operating Systems and Applications, running an up-to-date antivirus application, and turning on local firewall on the device to block unnecessary traffic.
Attacks compromising business email are increasingly targeting nonprofits, bilking them for gift cards instead of complicated wire transfers. Criminal hackers make a lot of money targeting businesses and institutions of all kinds with phishing attacks that lead to compromised business email. While crooks may have an array of systems in place to launder the funds they steal, researchers have noticed that so-called business email compromise scammers are leaning more and more on the humble gift card.
When Denise McKendry entered the Kroger store in Midlothian, Va., on Feb. 25, the schoolteacher was visibly distraught. She was on her cellphone, talking to a man who had identified himself as Officer Johnson from the IRS. He had explained, in threatening and sometimes nasty terms, that McKendry owed $5,207 in back taxes and that she’d be arrested if she did not pay it off. Fortunately, thanks to an arrangement among Google, the IRS and her local police department, she could easily make a down payment on her debt and avoid jail. All she had to do was buy two $500 Google Play gift cards and read their code numbers to him over the phone.