CyberSecurity

RansomWare sweeping Europe

For people using the following versions of Windows, make sure you have the following patches installed on your machine: Windows Vista and Windows Server 2008 - KB4012598 Windows 7 and Windows Server 2008 R2 - KB4012212 OR KB4012215 Windows Server 2012 - KB4012214 OR KB4012217 Windows 8.1 and Windows Server [...]

By |2018-01-02T11:53:19-05:00May 12th, 2017|Categories: Catch IT, CyberSecurity|

Critical Intel Chip Vulnerability

Threat: Critical Intel Chip Vulnerability from manufactures including: HP, Lenovo, Fujitsu, Dell, & Intel, allow hackers to remotely control the computer. Even if the PC is switched off! Real World Scenarios: A hacker can remotely: capture the keystrokes of your PC thereby stealing usernames and passwords. corrupt the BIOS making [...]

By |2018-01-02T12:31:06-05:00May 11th, 2017|Categories: Catch IT, CyberSecurity|

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |

Major Security Flaws Discovered in Western Digital’s My Cloud NAS Drives

Western Digital (WD) Corporation network-attached storage owners were warned of critical flaws in the company’s My Cloud line of hardware that exposed data stored on the devices to attack. The flaws impact a dozen Western Digital drives that could allow remote adversaries to bypass logins, insert commands, upload files without permission, and gain control [...]

By |2018-01-02T12:45:59-05:00March 13th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , |

Beware of “The “HoeflerText” font wasn’t found” scam

Hackers have crafted a new Google Chrome scam that could infect your computer with malware. A popup, which contains the message “The ‘HoeflerText’ font wasn’t found,” urges users to download an updated “Chrome Font Pack” to their computers. The update, however, is actually a malware download. How You Can Avoid [...]

By |2018-01-02T12:57:52-05:00February 27th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Netgear Routers have critical flaw

Threat: Several Netgear routers are vulnerable to remote hacking. Real World Scenarios: A hacker can take over your router and use it for other nefarious purposes. While compromised the router would most likely perform poorly affecting your Internet Access. Mitigation: Here's what you can do - Check for updates for your router [...]

By |2018-05-16T15:28:32-05:00December 14th, 2016|Categories: Catch IT, CyberSecurity|

Nov. 2016 Zero-Day Windows Flaw

Threat: Google security experts have reported a critical security flaw in Adobe and Windows products. The Windows flaw is confirmed by Microsoft not to have a patch yet. A flaw without a patch is called a Zero-Day flaw. Microsoft promises one in the monthly release this Tuesday Nov. 8'th. Google says, [...]

By |2019-07-31T12:56:40-05:00November 3rd, 2016|Categories: Catch IT, CyberSecurity|

Critical Apple iOS Update

Don't open another picture on your iPhone until you apply the latest update to the device. From the security notice accompanying  the 10.1 update - "Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution"    http://support.apple.com/en-us/HT207271 Plain English - Potentially, any image you view on your phone through: Facebook, Snapchat, [...]

By |2018-05-16T15:31:36-05:00October 25th, 2016|Categories: Catch IT, CyberSecurity|

Chrome 53 – Update now to fix critical security flaws

Google has released a new version of their popular Chrome browser. The new release, version 53, includes fixes for several critical security flaws. We recommend updating Google Chrome as soon as possible. To do so: Open Google Chrome. Click the 3 vertically-aligned dots under the X in the upper right hand corner. [...]

By |2018-05-16T15:32:49-05:00September 6th, 2016|Categories: Catch IT, CyberSecurity|

Back to (security) School?

91% of successful data breaches started with a spear-phishing attack. The Hackers get an A! I'll bet, less than 60% of your co-workers know what a spear-phishing attack is.   (Spear Phishing Definition) Despite all the money your company may have invested in: Firewalls, Antivirus, Antimalware, Antispam, VPN's, 2-Factor Authentication - [...]

By |2018-05-18T09:37:30-05:00August 18th, 2016|Categories: Catch IT, CyberSecurity|Tags: , , , , |

BMT’s Cyber Security Awareness Training Program

Today we are pleased to announce the launching of our: Cyber Security Awareness Training Program Cyber Security Ignorance No one wants to be the person that: clicks on a link that encrypts all the data on the company servers until a hefty ransom is paid, wires thousands of dollars to a [...]

By |2018-05-18T09:39:07-05:00August 18th, 2016|Categories: BMT Announcement, CyberSecurity|Tags: , , , |
Go to Top