CyberSecurity

Beware of “The “HoeflerText” font wasn’t found” scam

Hackers have crafted a new Google Chrome scam that could infect your computer with malware. A popup, which contains the message “The ‘HoeflerText’ font wasn’t found,” urges users to download an updated “Chrome Font Pack” to their computers. The update, however, is actually a malware download. How You Can Avoid [...]

By |2018-01-02T12:57:52-05:00February 27th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Netgear Routers have critical flaw

Threat: Several Netgear routers are vulnerable to remote hacking. Real World Scenarios: A hacker can take over your router and use it for other nefarious purposes. While compromised the router would most likely perform poorly affecting your Internet Access. Mitigation: Here's what you can do - Check for updates for your router [...]

By |2018-05-16T15:28:32-05:00December 14th, 2016|Categories: Catch IT, CyberSecurity|

Nov. 2016 Zero-Day Windows Flaw

Threat: Google security experts have reported a critical security flaw in Adobe and Windows products. The Windows flaw is confirmed by Microsoft not to have a patch yet. A flaw without a patch is called a Zero-Day flaw. Microsoft promises one in the monthly release this Tuesday Nov. 8'th. Google says, [...]

By |2019-07-31T12:56:40-05:00November 3rd, 2016|Categories: Catch IT, CyberSecurity|

Critical Apple iOS Update

Don't open another picture on your iPhone until you apply the latest update to the device. From the security notice accompanying  the 10.1 update - "Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution"    http://support.apple.com/en-us/HT207271 Plain English - Potentially, any image you view on your phone through: Facebook, Snapchat, [...]

By |2018-05-16T15:31:36-05:00October 25th, 2016|Categories: Catch IT, CyberSecurity|

Chrome 53 – Update now to fix critical security flaws

Google has released a new version of their popular Chrome browser. The new release, version 53, includes fixes for several critical security flaws. We recommend updating Google Chrome as soon as possible. To do so: Open Google Chrome. Click the 3 vertically-aligned dots under the X in the upper right hand corner. [...]

By |2018-05-16T15:32:49-05:00September 6th, 2016|Categories: Catch IT, CyberSecurity|

Back to (security) School?

91% of successful data breaches started with a spear-phishing attack. The Hackers get an A! I'll bet, less than 60% of your co-workers know what a spear-phishing attack is.   (Spear Phishing Definition) Despite all the money your company may have invested in: Firewalls, Antivirus, Antimalware, Antispam, VPN's, 2-Factor Authentication - [...]

By |2018-05-18T09:37:30-05:00August 18th, 2016|Categories: Catch IT, CyberSecurity|Tags: , , , , |

BMT’s Cyber Security Awareness Training Program

Today we are pleased to announce the launching of our: Cyber Security Awareness Training Program Cyber Security Ignorance No one wants to be the person that: clicks on a link that encrypts all the data on the company servers until a hefty ransom is paid, wires thousands of dollars to a [...]

By |2018-05-18T09:39:07-05:00August 18th, 2016|Categories: BMT Announcement, CyberSecurity|Tags: , , , |

Game of Thrones Phishing Attack

Illegally downloading television shows and movies from torrent websites is done all the time. Not surprisingly,  the HBO series, "Game of Thrones" is the #1 downloaded. Threat: Hackers are taking advantage of this fact by sending emails that look like a notice from IP-Echelon, which is the company that enforces copyright claims for companies such [...]

By |2018-05-18T09:40:45-05:00August 2nd, 2016|Categories: Catch IT, CyberSecurity|

Symantec AV Security Flaw

Threat: Google Security Experts have found a security flaw in Symantec AV products. The flaw affects all their AV software from the Norton Home version to their Enterprise Endpoint Protection software. They are quoted as saying, "It's as bad as it gets!" Risk: Hackers can take advantage of the flaw [...]

By |2019-07-31T12:38:50-05:00June 30th, 2016|Categories: Catch IT, CyberSecurity|

Fingerprint Biometric Security Hacked

Threat: Researchers at Michigan State University have developed a method to print scans of lifted fingerprints using a common inkjet printer.  Anyone in possession of this print can unlock the associated device. While the ink and paper must be of a special type (AgIC) they are readily available from online retailers, as are latent fingerprint kits. Risk: Fingerprint biometric security [...]

By |2018-05-18T09:59:25-05:00March 10th, 2016|Categories: CyberSecurity, News|Tags: |
Go to Top