Introduction A post in Bleeping Computer outlined a fiendish attack hackers are using to completely take over a victim’s Microsoft Office 365 (MSO365) account. This attack completely bypasses traditional security defenses, leaving only one way to stop it! Here’s how it works: A phishing email containing a link and masquerading as a shared OneDrive or […]
About Joe Imperato, Sr.
This author has yet to write their bio.Meanwhile lets just say that we are proud Joe Imperato, Sr. contributed a whooping 388 entries.
Entries by Joe Imperato, Sr.
Last week, we issued an alert about a fake Windows update delivering ransomware. Now, cyber-crooks upped their game by hacking into legitimate WordPress websites, injecting redirect scripts, and displaying fake Flash Player update alerts. According to ZDNet, if the user clicks the “Update” or “Later” buttons, the script takes the target to a fake download […]
Security blog, Threatpost warns of a SPAM email going around purporting to be a “critical Windows update” containing an attachment that installs the Cyborg ransomware. The email has the following characteristics: The subject line is two sentences saying, “Install Latest Microsoft Windows Update now! Critical Microsoft Windows Update!” The email body contains just one sentence, […]
Cybercriminals are gunning for the healthcare industry. Attacks on healthcare have increased exponentially, and experts expect things to get worse. Read on to find out the causes and what to do to stop this crisis.
Scammers are getting more sophisticated. Their latest trick is sending fake WebEx invites that can mean BIG trouble if you click the “Join Meeting” link. Read on.
The General Data Protection Regulation, also known as GDPR, was the most comprehensive and sweeping data privacy directive to “hit the books” in many years. The GDPR is coming to America in the form of individual state regulations, forcing organizations to take better care of the personal data they hold. Does it affect you? You bet it does. Read on.
Two-factor Authentication is a great security technique, but a good social engineer can get around it if you’re not careful. Read on to find out how they do it and what you can do to protect yourself.
One thing a business never wants to do, is to send an e-mail to their customers explaining that a hacker accessed their info through you or that all of their information was lost because there was not a reliable backup system in place. Read on and find the seven (7) crucial things every business should do to prepare for the worst.
A popular Proctor & Gamble website was hacked and stealing payment information from U.S. based customers. Find out how the criminals pulled it off and why it is so dangerous to your wallet.
The healthcare industry is under siege. From large billion-dollar companies to small medical practices are being attacked because a single medical record can bring a hacker as much as $1,000 on the dark web. Read on and find out what your healthcare company should be doing to protect themselves and their patients.