This article is contributed. See the original author and article here.
Original release date: December 4, 2020
Google has released Chrome version 87.0.4280.88 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary updates.
This article was originally posted by the FTC. See the original article here.
Welcome to the FTC’s 12 Days of Consumer Protection, a holiday series to help you save money and avoid scams.
Each day, we’ll cover a new topic — from shopping online and bogus shipping notifications to temporary job scams and fake charities. We’ll give you practical information you can use every day and share with your family, friends, and community so they can be safe too.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
This article is contributed. See the original author and article here.
Original release date: December 3, 2020
VMware has released security updates to address a vulnerability—CVE-2020-4006—in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. An attacker could exploit this vulnerability to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review VMware Security Advisory VMSA-2020-0027.2 and apply the necessary updates.
This article is contributed. See the original author and article here.
Original release date: December 3, 2020
Iranian cyber threat actors have been continuously improving their offensive cyber capabilities. They continue to engage in more conventional offensive cyber activities ranging from website defacement, distributed denial of service (DDoS) attacks, and theft of personally identifiable information (PII), to more advanced activities—including social media-driven influence operations, destructive malware, and, potentially, cyber-enabled kinetic attacks.
This article was originally posted by the FTC. See the original article here.
Scammers are calling people and using the names of two companies everyone knows, Apple and Amazon, to rip people off. Here’s what you need to know about these calls.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
This article was originally posted by the FTC. See the original article here.
By Alvaro Puig, Consumer Education Specialist, FTC
Scammers are calling people and using the names of two companies everyone knows, Apple and Amazon, to rip people off. Here’s what you need to know about these calls.
In one version of the scam, you get a call and a recorded message that says it’s Amazon. The message says there’s something wrong with your account. It could be a suspicious purchase, a lost package, or an order they can’t fulfill.
In another twist on the scam, you get a recorded message that says there’s been suspicious activity in your Apple iCloud account. In fact, they say your account may have been breached.
In both scenarios, the scammers say you can conveniently press 1 to speak with someone (how nice of them!). Or they give you a phone number to call. Don’t do either. It’s a scam. They’re trying to steal your personal information, like your account password or your credit card number.
If you get an unexpected call or message about a problem with any of your accounts, hang up.
Do not press 1 to speak with customer support
Do not call a phone number they gave you
Do not give out your personal information
If you think there may actually be a problem with one of your accounts, contact the company using a phone number or website you know is real.
Read our article to learn how to block unwanted calls on a mobile phone or on your home phone. And if you do get a call you think is a scam, report it at ReportFraud.ftc.gov.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments