New Mortgage Scam

The American Dream, to own our slice of realty, is something most of us work toward. It can be exciting to have a place of your own to plant roots and start up a new life. After all the searching and the negotiating, you're finally ready to sign the contract... and then find out your settlement fees have been stolen. Hackers have been using an email and money wiring scam in order to steal closing [...]

By | March 21st, 2016
Security Awareness|Comments Off on New Mortgage Scam

Mobile Phishing

Mobile Phishing By: Pierluigi Paganini Emails are considerable as a primary vector for cyber-attacks against mobile devices, principal security firms revealed that phishing activities in the last few years have increased exponentially, targeting every sector from industry to government agencies. RSA’s October Online Fraud Report 2012 described an impressive increase in phishing attacks, up 19% over the second half of 2011. The total loss for various organizations sums up to $2.1 billion over the last 18 months; [...]

By | April 2nd, 2013
Network Security & Solutions|Comments Off on Mobile Phishing

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Holiday Shopping Security Tips

By | December 6th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Holiday Shopping Security Tips

Ten Tips to Stay Safe on Cyber Monday

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. For employees who spend time making purchases either at lunch, break time, or at the end of the work day, here are some tips to stay safe on the largest online activity day of the year. [1] Make sure your desktop computer, laptop, smartphone, or mobile [...]

By | November 22nd, 2011
Industry InSights, Network Security & Solutions, Security Awareness|Comments Off on Ten Tips to Stay Safe on Cyber Monday

Threat Morphosis: Two Decades of Malware

By | November 14th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Threat Morphosis: Two Decades of Malware

Security Alert: W32/Zbot Malware (also known as Zeus)

InfoSight has detected a flood of phishing emails that are propagating through the Internet and targeting small community banks.  This spam campaign is delivering hundreds of thousands of messages that masquerade as a failed wire transfer, while delivering the password-stealing Zeus banking Trojan.  The hackers were very aware of who to target; they went after the individuals in the bank responsible for wire transfers. A snapshot of a sample email is provided below. The <From:> [...]

By | July 5th, 2011
Network Security & Solutions|Comments Off on Security Alert: W32/Zbot Malware (also known as Zeus)

What Are the Top Security Threats for 2009?

Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on What Are the Top Security Threats for 2009?