More Scammers Are Using Social Media To Target Victims

More Scammers Are Using Social Media To Target Victims

An increasing number of scammers are using social media to target victims and relying on social engineering tricks to convince people to part with their personal information or money.  The problem has grown serious enough that the FTC (Federal Trade Commission)...
Additional Security Recently Added To Office 365

Additional Security Recently Added To Office 365

Back in September of 2020 Microsoft announced that it was experimenting with the addition of SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online. This was done in a bid to ensure the email communication and security of their Office 365 customers....
Suspicious Files Get New Warnings In Google Drive

Suspicious Files Get New Warnings In Google Drive

If you have Google Drive, there’s good news.  The company has recently announced that soon they’ll be rolling out a new feature to help alert users to the presence of suspicious documents. Google Drive users will soon start seeing banners alerting...
Dark Herring Subscription Scam Affected Millions Of Android Users

Dark Herring Subscription Scam Affected Millions Of Android Users

Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google’s nose for nearly two years. The scam has now been shut down by Google but while it was...
E-Mail From Department Of Labor Could Be Phishing Attack

E-Mail From Department Of Labor Could Be Phishing Attack

There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one. The attackers have designed an email template that does an admirable job of imitating the look and feel of emails sent from the US...
Vulnerability In This Cisco Software Could Allow Hackers Access

Vulnerability In This Cisco Software Could Allow Hackers Access

Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS.  The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any device suffering from the vulnerability...