As the threat of COVID-19 (aka Novel) Coronavirus has become a worldwide concern, cybercriminals have started using the public's interest in staying updated on the virus to their advantage.
...
In our recent article, Office 365 Attacks On The Rise, How To Reduce Your Risk , we talked about the recent trend toward compromised Office 365 attacks and how to make yourself less of a target. But, what if you think your Office 365 account has been hacked? Maybe you are seeing 'rules' in Outlook that you didn't create.. or Sent Items you didn't send.....
We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert. While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window.
REAL ALERTS
Will include the vendor logo, vendor product name, and details on the problem. For example, a Symantec anti-virus alert will...
It's been almost a year since half of Americans had their sensitive personal information exposed due to the Equifax data breach.
The latest stats in 2018 since that breach:
22 million individuals have become victims of ID theft since the Equifax breach
ID theft is America's fastest-growing crime, affecting more people than car theft and home burglaries combined
Thieves will wait up to 10 years (or more)...
In our recent article, Office 365 Attacks On The Rise, How To Reduce Your Risk , we talked about the recent trend toward compromised Office 365 attacks and how to make yourself less of a target. But, what if you think your Office 365 account has been hacked? Maybe you are seeing 'rules' in Outlook that you didn't create.. or Sent Items you didn't send.....
Hackers are increasingly targeting Microsoft Office 365 accounts. And, unfortunately, once your account is compromised it can be difficult to detect and even more difficult to prevent reinfection. We at ESG have pulled together the following information to help your business understand the risk and respond if you suspect your Office 365 account has been compromised.
Why is Office 365 attacked so often and why are...
We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert. While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window.
REAL ALERTS
Will include the vendor logo, vendor product name, and details on the problem. For example, a Symantec anti-virus alert will...
Understanding the Risk
In the news recently are two new system risks.. Meltdown and Spectre. These impact devices across the IT spectrum.. from Windows to Macs to Linux/Unix. Even devices such as iPads and other tablets can be at risk. The two risks exist at the chip/chipset level of the devices and leave them vulnerable to cyber attackers trying to access and exploit sensitive information.
Meltdown affects...
A very serious exploit for Apple systems running the High Sierra OS has come to light. You can read more about it here:
https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/
For a short-term fix Apple suggested this:
https://support.apple.com/en-us/HT204012
In working on a long-term fix, Apple created another issue in which file shares/sharing is broken. You can read more about that one here:
https://www.macrumors.com/2017/11/29/apple-macos-high-sierra-file-sharing-fix/
While a fix for that is pending, the manual steps to fix it are...
Recently we have seen an uptick in e-mails claiming to be from "Microsoft Outlook", "Microsoft O365", or "Hosted Email" which are fake e-mail queue alerts. An example of such an e-mail is shown below.
These alerts may be difficult to distinguish from real e-mail alerts. However, there are common warning signs. For example, if you hover over the "Retrieve" link in one of these e-mails it...