New Mortgage Scam

The American Dream, to own our slice of realty, is something most of us work toward. It can be exciting to have a place of your own to plant roots and start up a new life. After all the searching and the negotiating, you're finally ready to sign the contract... and then find out your settlement fees have been stolen. Hackers have been using an email and money wiring scam in order to steal closing [...]

By | March 21st, 2016
Security Awareness|Comments Off on New Mortgage Scam

How to Protect Yourself from Identity Theft Tax Refund Fraud

Identity Theft Tax Refund Fraud Tax season is officially upon us. It’s time to gather your W-2s, crunch numbers and mail your annual income taxes to Uncle Sam. It’s also time to learn about the number one fraud of the season: identity theft tax refund fraud. Understanding how cyber criminals pull it off and what the consequences are for victims can help protect yourself. Identity theft tax refund fraud occurs when someone uses another person’s [...]

By | January 19th, 2016
Security Awareness|Comments Off on How to Protect Yourself from Identity Theft Tax Refund Fraud

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

What is this? A new "TDLv4" version of the TDSS rootkit, which was first discovered in 2008, has infected over 4.5 million machines world-wide as of April 2011. Infected machines are joined to a botnet which can be used for malicious purposes such as mounting network/endpoint attacks, allowing installation of more malware on the infected systems, distributing "spam" emails, and exfiltrating user data. The Dirty Details... TDLv4 uses a number of sophisticated components including rootkit [...]

By | July 18th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

Security Alert: W32/Zbot Malware (also known as Zeus)

InfoSight has detected a flood of phishing emails that are propagating through the Internet and targeting small community banks.  This spam campaign is delivering hundreds of thousands of messages that masquerade as a failed wire transfer, while delivering the password-stealing Zeus banking Trojan.  The hackers were very aware of who to target; they went after the individuals in the bank responsible for wire transfers. A snapshot of a sample email is provided below. The <From:> [...]

By | July 5th, 2011
Network Security & Solutions|Comments Off on Security Alert: W32/Zbot Malware (also known as Zeus)

What Are the Odds of a Security Breach at Your Institution?

If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...

By | March 31st, 2009
Network Security & Solutions|Comments Off on What Are the Odds of a Security Breach at Your Institution?