Category: Security Alerts

What is Social Engineering?

Social engineering refers to the methods attackers use to deceive victims into performing an action. Typically, these actions are opening a malicious webpage or running an unwanted file attachment. Many social engineering efforts are focused on tricking users into disclosing usernames or passwords, allowing attackers to send messages as an internal user to further their…

Read More »

What is a Rootkit?

A rootkit is a piece of software that hides programs or processes running on a computer. Malware frequently installs rootkits upon infection to hide its activity. A rootkit can hide keystroke loggers or password sniffers, which capture confidential information and send it to hackers via the Internet. It can also allow hackers to use the…

Read More »

What are PUA’s or Potentially Unwanted Applications?

Potentially unwanted applications are programs that are not malicious but may be unsuitable for use in a business environment, and may create security concerns. Some applications are non-malicious and possibly useful in the right context, but are not suitable for company networks. Examples are adware, tools for administering PCs remotely and scanners that identify vulnerabilities…

Read More »

What are Phishing emails?

Phishing refers to the process of deceiving recipients into sharing sensitive information with an unknown third party (cyber criminal). Typically in a phishing email scam, you receive an email that appears to come from a reputable organization, such as: Banks Social media (Facebook, Twitter) Online services with access to your financial information (e.g., iTunes, student…

Read More »

Can Mobile Devices Get Malware?

The answer to that question is most definitely YES! Thousands of mobile malware variants have been discovered since late 2010, when the first malware samples for Android and iOS devices were identified. Today, malware researchers have discovered many more malicious apps for Android than for iOS, most likely due to Android devices allowing their users…

Read More »

Hoax Emails

What is a Hoax Email? Hoaxes are reports of false and unsubstantiated claims, in an attempt to trick or defraud users. A hoax could be an attempt to solicit money, an attempt to install malware, or an attempt to consume bandwith (by having users forward a hoax email). Hoaxes in the form of emails do…

Read More »

Data Theft

Data theft is the deliberate theft of information, rather than its accidental loss. Data theft can take place both inside an organization (e.g., by a disgruntled employee), or by criminals outside the organization.   Criminals often use malware to access a computer and steal data. A common approach is to use a Trojan to install…

Read More »

Consider these best practices to create a secure password.

Passwords are your protection against fraud and loss of confidential information, but few people choose passwords that are really secure. Here are some suggested password best practices to consider when creating your password. Make your password as long as possible The longer a password is, the harder it is to guess or to find by…

Read More »