The latest issue of Vipre Security News contains some articles on email spoofing and what to do if your email account is hijacked. … email spoofing is the forgery of an email so it appears to be coming from someone other than the actual source. Spammers often use spoofing to get folks to open and… Continue reading email hacking and spoofing
Employees Fall for Phishing
This Enterprise Systems article highlights once again that protecting yourself from phishing attacks requires guidance and training. Relying on good intentions is not enough. Many are tricked into clicking on links in phishing e-mail messages anyway. The cleverness of cybercriminals can still overcome the best intentions of employees. As Sjouwerman [KnowBe4 founder and CEO Stu… Continue reading Employees Fall for Phishing
Apple Security Update and File Quarantine
ars technica writes, “The Security Update 2011-003 that Apple released on Tuesday directly addressed the Mac Defender malware threat in two ways: it changed the way malware files are detected by enabling automatic daily updates, and included code to remove at least two of its variants.” The article further discusses Apple’s response to a growing… Continue reading Apple Security Update and File Quarantine
How to avoid or remove Mac Defender malware
Apple posted this article regarding: A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus. The user is then offered Mac Defender “anti-virus” software to solve the issue. And MacWorld writes: Online crime falls mostly into four… Continue reading How to avoid or remove Mac Defender malware
Recognizing Fake Antiviruses
The United States Computer Emergency Readiness Team (CERT) defines a fake anivirus as: Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security… Continue reading Recognizing Fake Antiviruses