As the threat of COVID-19 (aka Novel) Coronavirus has become a worldwide concern, cybercriminals have started using the public's interest in staying updated on the virus to their advantage.
...
We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert. While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window.
REAL ALERTS
Will include the vendor logo, vendor product name, and details on the problem. For example, a Symantec anti-virus alert will...
We often get asked how to identify a real alert (from Windows, Apple, anti-virus, etc) from a fake alert. While hackers are always advancing their trade to improve their success rates, the following general rules apply when presented with sudden "alert" or pop-up window.
REAL ALERTS
Will include the vendor logo, vendor product name, and details on the problem. For example, a Symantec anti-virus alert will...
Be aware of a trending scam involving a pretty real-looking e-mail from Apple. The e-mail claims to be from Apple Support and indicates your Apple ID and iCloud are both going to be suspended because you did not complete verification on time. Given the number of new Apple devices being sold at the moment and for the holiday season, this attack may hit many of your employees.. employees...
Phishing attempts are on the rise. A phishing e-mail is one that is sent to you in the hopes of getting you to open an attachment or click on a link. That attachment or link actually infects your system or tries to get you to enter login/password information so it can steal data from you. More details on phishing can be found here and here.
We...
Ransomware is the offshoot of malware in which a hacker crafts a package such that, once deployed to your system, your files become encrypted and you are forced to pay the hacker a 'ransom' in real dollars to decrypt the data. The most widely known variation of ransomware to date has been Cryptolocker. Ransomware made big inroads during 2012 and 2013, but was curtailed in...
The latest trend in spam e-mails is bogus eFax alerts. These are spoofed from eFax so it is very hard for the spam filtering, Outlook, or free e-mail (AOL, Apple, Gmail) to detect them.
The ONLY way to know if an eFax e-mail is safe is to hover over the link (do not click it). When hovering you will see if the e-mail is legit (uses...
There is a new strain of malware going around called Cryptolocker. This malware infects your system from a website ad, downloaded file, or e-mail attached. Once on your system, it encrypts the files on your computer so that you are no longer able to open them. It then begins generating pop-up messages demanding that you pay a ransom in order to be able to access...
Typically e-mails used in phishing attacks have some tell-tale signs such as poor spelling, incorrect dates, and missing logos. Recently a much more sophisticated phishing attack has started. This attack appears to come from the Better Business Bureau. It informs you that your business has had a complaint filed against it, and that you must respond quickly or your business will be tagged with an...
A recent trend in malware has been to infect your system and "hold it ransom" by denying you access to your files until you pay for a service or fix.
Per a recent article by Herb Weisbaum for NBC News: "Imagine having all of your computer files — including taxes and other important data — kidnapped and held for ransom. It’s happening more and more. Internet...