Post info:

Tech Support Scams

  Keloland has a story covering Tech Support scams in conjunction with the Better Business Bureau (BBB). Tis` the season again when the bad guys are out in full force trying to trick you to either giving out your password, personal information, or access to your computer. We see multiple individuals a week come in with this exact scam. It starts with either a pop up on the screen, which is usually scare-ware, or a phone call from a large

Read the full post

Post info:

Apple Users!

There has been another newly discovered flaw in the newest version of their operating system – macOS High Sierra. This flaw allows anyone with local & remote access to the machine to log in as the “root” user without supplying a password. The fix is simple… chance the root account password. Source: https://goo.gl/jvjzuf 

Read the full post

Post info:

Have you taken Uber yet?

    While Uber is slowly making their way to the Midwest, many people have traveled and taken advantage of the new service at some point in time. Uber has become a statistic. Today, Uber warned their customers about a breach of 57 MILLION records including drivers and riders alike. The biggest information isn’t the breach in this story, but the amount of time it has taken Uber to confess their breach: 1 year. Allegedly, Uber also tried to pay

Read the full post

Post info:

Western Union scam victim?

  “If you, a friend or loved one lost money in a scam involving Western Union, some or all of those funds may be recoverable thanks to a more than half-billion dollar program set up by the U.S. Federal Trade Commission.” If anyone you know were scammed & paid the ransom through Western Union’s money transfer, They may be able to get some or all of their money back. The dates must coincide from January 1st, 2004 to January 19,

Read the full post

Post info:

Computer Tip: UPDATE, UPDATE, UPDATE

We have said it before and will say it again. Updates NEED to be applied on virtually every computer on your network (unless is it segmented on the firewall). Below are the stats for today’s Patch Tuesday. The tricky part is the bad guys sometimes get this information before the good guys do, giving them a substantial head start in the cybersecurity race. This is why proactive security measures as in a monitored/managed update system are always suggested. “Microsoft on Tuesday released

Read the full post

Post info:

Incoming mail detected!!

“A free new service from the U.S. Postal Service that provides scanned images of incoming mail before it is slated to arrive at its destination address.” At face value, it sounds great. However, this could pose as a private investigators, identity thieves, & stalkers dream. Madison area (57042) is eligible to start receiving these “Informed Delivery” notifications. Source & more information here: https://goo.gl/qgjkUE  

Read the full post

Post info:

Equifax Breach – Update

For additional information on the breach: https://www.equifaxsecurity2017.com/ Check if your information was potentially compromised at this link: https://trustedidpremier.com/eligibility/eligibility.html  More than likely you will have someone in your office/business/organization that has been affected by this breach. As always stay vigilant for very targeted phishing emails.

Read the full post

Post info:

Not your average email

We have seen an uptick in targeted emails asking to validate their credentials, confirm or reset the password, or to simply confirm the account. Below is an example of the targeted email. This particular email was caught and sent to the Junk Folder so the pictures are not showing up as usual. There is no consistency in what platform in which they are coming across (Office 365 or Gmail).It’s just another reminder to keep an eye out for suspicious activity.

Read the full post

Post info:

Personal Information + Phone Number + Trickery = Hacked

Here is an informative article from Forbes on a tactic hackers are using for Ransomware involving phone numbers and personal information. We are under the false assumption that hackers are after your personal computer and the information on that. However, people are using their personal phone just as much as their computers. This article is tailored for phones, but the security measures can be applied to your computer as well. Article: (CLICK HERE)

Read the full post

Posts navigation