by Scott Muniz | Dec 9, 2020 | Security, Technology
This article is contributed. See the original author and article here.
Original release date: December 9, 2020
The Australian Cyber Security Centre (ACSC) has launched a new cyber security campaign encouraging all Australians to protect themselves against online threats. The initial focus of the campaign is ransomware threats, and the ACSC provides easy-to-follow security advice at cyber.gov.au to help Australians act now and stay secure.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the official ACSC campaign announcement for more information and to consult CISA’s ransomware page for additional guidance and resources.
This product is provided subject to this Notification and this Privacy & Use policy.
by Scott Muniz | Dec 9, 2020 | Security
This article was originally posted by the FTC. See the original article here.
It’s the 4th day of Consumer Protection and ’tis the season of…gift cards. Even in Santa’s workshop, it’s one of the most popular ways to give to family and friends for the holidays. But gift cards also are a favorite way for scammers to steal people’s money.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
by Scott Muniz | Dec 8, 2020 | Security, Technology
This article is contributed. See the original author and article here.
Original release date: December 8, 2020
OpenSSL has released a security update to address a vulnerability affecting all versions of 1.0.2 and 1.1.1 released before version 1.1.1i. An attacker could exploit this vulnerability to cause a denial-of-service condition.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the OpenSSL Security Advisory and apply the necessary update.
This product is provided subject to this Notification and this Privacy & Use policy.
by Scott Muniz | Dec 8, 2020 | Security, Technology
This article is contributed. See the original author and article here.
Original release date: December 8, 2020
FireEye has released a blog addressing unauthorized access to their Red Team’s tools by a highly sophisticated threat actor. Red Team tools are often used by cybersecurity organizations to evaluate the security posture of enterprise systems. Although the Cybersecurity and Infrastructure Security Agency (CISA) has not received reporting of these tools being maliciously used to date, unauthorized third-party users could abuse these tools to take control of targeted systems. The exposed tools do not contain zero-day exploits.
CISA recommends cybersecurity practitioners review FireEye’s two blog posts for more information and FireEye’s GitHub repository for detection countermeasures:
This product is provided subject to this Notification and this Privacy & Use policy.
by Scott Muniz | Dec 8, 2020 | Security
This article was originally posted by the FTC. See the original article here.
Whether you’re just starting out or starting a new life, information on your background report can determine if you get credit, a job, or even housing. That’s why the law requires background screening companies to take steps to ensure the accuracy of the information they collect and share about you. But some companies don’t take enough of these steps and put together inaccurate background reports that can stand between you and a place to live.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
by Scott Muniz | Dec 8, 2020 | Security, Technology
This article is contributed. See the original author and article here.
Original release date: December 8, 2020
Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following Adobe Security Bulletins and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Recent Comments