Search

Phishing Scams – What can you do about them?

Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises. These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). The perpetrators then use this private information to commit theft. The best defense against phishing attempts is to educate everyone on staff. Here are some tips. • Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the

Intel Remote Exploit

On May 1, Intel published a security advisory regarding a firmware vulnerability in certain systems that utilize Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) or Intel® Small Business Technology (SBT). The vulnerability could enable a network attacker to remotely gain access to business PCs or devices that use these technologies. You can use this link to the discovery tool to see if your PC/Server is vulnerable. Intel Discovery Tool If you have questions or want help with this issue contact the TIC Help Desk Update: Details of how to exploit this vulnerability are now public. It is important to take steps to secure vulnerable systems as soon as possible.

Microsoft Security Flaw

Everyone should run windows update on their computers. Microsoft has released an urgent update to stop hackers taking control of computers with a single email.The unusual bug, in Microsoft anti-malware software such as Windows Defender, could be exploited without the recipient even opening the message. Read full story at the BBC http://www.bbc.com/news/technology-39856391

Massive Phishing Attack Targets Millions of Gmail Users

From NBC News An unusually sophisticated identity phishing campaign appeared to target Google's roughly 1 billion Gmail users worldwide, seeking to gain control of their entire email histories and spread itself to all of their contacts, Google confirmed Wednesday. The worm — which arrived in users' inboxes posing as an email from a trusted contact — asked users to check out an attached "Google Docs," or GDocs, file. Clicking on the link took them to a real Google security page, where users were asked to give permission for the fake app, posing as GDocs, to manage users' email account. To make matters worse, the worm also sent itself out to all of the affected users' contacts — Gmail or other

(617) 884-1086

PO Box 3279, 360 N. Main St.,  Andover, MA 01810 

  • facebook

©2020 BY TIC BUSINESS CONSULTANTS