Call Center Exploits – What You Need To Know
Cybercriminals are getting bold and using the telephone to convince users to download malware. Find out about this new tactic and what to do about it.
This author has yet to write their bio.Meanwhile lets just say that we are proud Joe Imperato, Sr. contributed a whooping 438 entries.
Cybercriminals are getting bold and using the telephone to convince users to download malware. Find out about this new tactic and what to do about it.
Last week’s security LinkedIn posts by XSolutions: The Dangers Of Working From Home (4/2/2021) Folks, I’m sure you’ve all heard of the nonsense tweet that was sent out from the official account of U.S. Strategic Command a few days ago. The mainstream media treated the event as “cute” after discovering that a work-from-home manager’s child […]
The New York State Bar Association Gets Behind Cybersecurity Training Continuing legal education (CLE) credits are necessary for professional growth and development after admission to the Bar. CLEs are available to American Bar Association (ABA) members in a growing library accessible online. Recently, the New York State Bar Association (NYSBA) announced that New York attorneys […]
Now that work from home is, at least, a semi-permanent feature, home-workers need to harden their home networks. Here’s how.
News you can use now! Our recent security postings from this past week.
The IoT has increased cybercriminals’ attack area, putting home workers and their employers more at risk. Find out what’s changed and how to protect yourself and your business.
News you can use now! Our recent security postings from this past week.
A selection of our recent security postings from this past week.
Covid-19 catapulted unemployment scams to new heights. Find out what you can do to stay safe.
Here are a select few of this week’s LinkedIn posts by XSolutions: Beware: 14% of Mobile Apps Do Not Secure Your Data (Posted 03/05/2021) Analysis by Zimperium found that 14% of iOS and Android apps store user data on third-party servers that are misconfigured and can leave you vulnerable to cybercriminals. Most users think that […]