Category: Security Alerts

Holiday Inn Hacked!

Another company is added to the list of data breaches for 2017. News of the breach was released last Friday by Holiday Inns parent company IHG. Holiday Inn Express locations in Keene, North Conway and Durham were identified in an April 14 consumer alert. Here you will find a full list of properties effected. According to…

Read More »

What is Social Engineering?

Social engineering refers to the methods attackers use to deceive victims into performing an action. Typically, these actions are opening a malicious webpage or running an unwanted file attachment. Many social engineering efforts are focused on tricking users into disclosing usernames or passwords, allowing attackers to send messages as an internal user to further their…

Read More »

What is a Rootkit?

A rootkit is a piece of software that hides programs or processes running on a computer. Malware frequently installs rootkits upon infection to hide its activity. A rootkit can hide keystroke loggers or password sniffers, which capture confidential information and send it to hackers via the Internet. It can also allow hackers to use the…

Read More »

What are PUA’s or Potentially Unwanted Applications?

Potentially unwanted applications are programs that are not malicious but may be unsuitable for use in a business environment, and may create security concerns. Some applications are non-malicious and possibly useful in the right context, but are not suitable for company networks. Examples are adware, tools for administering PCs remotely and scanners that identify vulnerabilities…

Read More »

What are Phishing emails?

Phishing refers to the process of deceiving recipients into sharing sensitive information with an unknown third party (cyber criminal). Typically in a phishing email scam, you receive an email that appears to come from a reputable organization, such as: Banks Social media (Facebook, Twitter) Online services with access to your financial information (e.g., iTunes, student…

Read More »

Can Mobile Devices Get Malware?

The answer to that question is most definitely YES! Thousands of mobile malware variants have been discovered since late 2010, when the first malware samples for Android and iOS devices were identified. Today, malware researchers have discovered many more malicious apps for Android than for iOS, most likely due to Android devices allowing their users…

Read More »