Post info:

Equifax Breach

OUCH… 143 million… Be expected to get phishing attacks with VERY detailed information about you, birth dates, credit card numbers, the number of credit cards you own, etc. This is a very large breach within the US. More to come as details they emerge. Source: https://goo.gl/BqF8WJ

Read the full post

Post info:

Credit Card Skimmers

Many of you from the area heard about the credit card skimmers at the gas pumps in Baltic, SD. The great news is, they caught the culprets. The bad news is that they found over 50 credit cards in their vehicle upon arrest. That just means they are taking those stolen credit swips from Baltic, retreviing the numbers and information associated with it and duplicating the card to purchase additional items under your identity. A quick google search shows the machine

Read the full post

Post info:

Outlook Web Access

If you are a business owner or employee that uses Outlook, please take notice. Here is a full text (short) article from the Internet Storm Center (ISC) about how a hacker may use Outlook as a vehicle to steal money from you in a blink of an eye. We have seen this tactic used right here in Lake County. Recently we’ve started seeing some attacks that utlise OWA. A person in the victim organisation sends an email to one or more

Read the full post

Post info:

The Importance of Patch Management

  The day after Patch Tuesday… In a way, the bad guys get the equivalence of Christmas once a month and today is the day. Per Krebs on Security, the last round of patches fixed just shy of 60 vulnerabilities between Windows, Adobe, Flash, & other programs. Again, these patches are covering up vulnerabilities to your network that the bad guys found. Make sure to patch every computer in your organization/house and monitor the success rate of each one as well.

Read the full post

Post info:

Not your average email

We have seen an uptick in targeted emails asking to validate their credentials, confirm or reset the password, or to simply confirm the account. Below is an example of the targeted email. This particular email was caught and sent to the Junk Folder so the pictures are not showing up as usual. There is no consistency in what platform in which they are coming across (Office 365 or Gmail).It’s just another reminder to keep an eye out for suspicious activity.

Read the full post

Post info:

Personal Information + Phone Number + Trickery = Hacked

Here is an informative article from Forbes on a tactic hackers are using for Ransomware involving phone numbers and personal information. We are under the false assumption that hackers are after your personal computer and the information on that. However, people are using their personal phone just as much as their computers. This article is tailored for phones, but the security measures can be applied to your computer as well. Article: (CLICK HERE)

Read the full post

Post info:

WannaCry – Ransomware

A new strain of ransomware was reported on Friday named WannaCry. The ransomware has spread quickly across the world infecting hundreds of thousand systems. This virus is a bit more malicious though because it just doesn’t infect the PC that it came in on, but the whole network in which it is connected to. This virus is so broad Windows created patches for systems they don’t service anymore including XP & Vista. (If you are a business, we have STRONGLY recommended upgrading those PC’s) 

Read the full post

Post info:

Notice from the FBI concerning email

The nation has seen a rise in business emails being compromised leading to billions of dollars being transferred out of their accounts to bad guys. Just because we are in South Dakota, does not mean we are irrelevant to this type of scam. Below is a public service announcement from the FBI on the compromise of emails, background, stats, and some suggestions for protection for your business. Please take some time to read through and education/protect yourself and employees of

Read the full post

Post info:

Do you use Google Docs?

The bad guys are at it again. This time they are targeting Google Doc requests. They are sending out a Google Doc shared document with you. Once you click it, it brings you to a URL redirect.  The final part of the attack is it asks if Google Docs can read, send manage your emails and manage your contact. They are using all of the images that Google has with the Google Drive accounts as well as gmail icon. Once

Read the full post

Post info:

ATM Skimming Devices

If you ever get money out of an ATM or pay at the pump, you should incorporate checking the card slot or the keypad for a skimmer into your routine. Krebs on Security provides a quick education on skimmers. These types of devices have been as close as Aberdeen. Consider them everywhere. Article: https://krebsonsecurity.com/2017/03/why-i-always-tug-on-the-atm/   

Read the full post

Posts navigation