CyberSecurity

Microsoft Remote Access Protocol Flaw Affects All Versions of Windows

A serious vulnerability found in Microsoft's Credential Security Support Provider protocol (CredSSP) could allow a hacker to gain control of a domain server and other systems in the network. CredSSP protocol has been designed to be used by RDP (Remote Desktop Protocol) and Windows Remote Management (WinRM) that takes care [...]

By |2018-03-14T15:29:11-05:00March 14th, 2018|Categories: Advisory, Catch IT, CyberSecurity|

Vulnerability Found in Lenovo’s Fingerprint Scanner, Update Required

A security flaw was recently identified in Fingerprint Manager Pro, an application developed by Lenovo that allows users to log into Windows machines and online websites by scanning one of their fingerprints using the fingerprint scanner embedded in selected Lenovo products. Sensitive data stored by Lenovo Fingerprint Manager Pro, including [...]

By |2018-02-07T12:58:13-05:00January 31st, 2018|Categories: Catch IT, CyberSecurity|

Recent Security Flaws Detected in Computer Chips

THREAT: Two security flaws have been discovered that affect nearly all microprocessors, the digital brains of the world’s computers. Dubbed Meltdown and Spectre, these major security flaws found in microprocessors are causing havoc amongst tech giants.  Up against the clock, experts are working to create patches to fix this problem [...]

By |2018-01-11T16:44:34-05:00January 11th, 2018|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Microsoft Issues Update for Critical Flaw Found in Malware Protection Engine

Microsoft revealed a critical vulnerability in its Malware Protection Engine (MPE) on Thursday (12/7) that allows an attacker to take full control of a target’s computer. Enabled by default, Microsoft Malware Protection provides the core cybersecurity capabilities for Microsoft anti-virus and anti-spyware programs in all of the company’s products. The vulnerability is [...]

By |2018-01-02T11:31:25-05:00December 8th, 2017|Categories: BMT Announcement, Catch IT, CyberSecurity|Tags: , |

Using Wi-Fi? KRACK Kills Your Privacy

THREAT: A new flaw has compromised the most widely used Wi-Fi Protocol (WPA2), allowing hackers to decrypt and view everything you are doing online. The exploit is called KRACK, short for Key Reinstallation Attacks.  This breach can be used to steal sensitive information such as credit card numbers, passwords, chat messages, [...]

By |2019-07-31T13:26:14-05:00October 16th, 2017|Categories: Catch IT, CyberSecurity|Tags: , , |

Look out Phishing, here comes Smishing!

Look out Phishing, here comes Smishing! There’s a new scam in town!  Although the name may sound funny, becoming a victim is not joke.  “Smishing” is an identity theft scheme that involves sending consumers text messages containing a link to a fraudulent website or phone number in an attempt to [...]

By |2018-01-02T11:43:14-05:00July 19th, 2017|Categories: Catch IT, CyberSecurity|

Cybersecurity Protocols and the Way We Do Business

The challenges of cybersecurity are changing the business landscape. As the risks associated with a data breach continue to rise, businesses are taking a closer look at their existing protocols and implementing formal risk assessments, policies and standards. Proactive companies not only audit themselves, but also look at vendors [...]

By |2019-07-31T13:08:48-05:00June 12th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

RansomWare sweeping Europe

For people using the following versions of Windows, make sure you have the following patches installed on your machine: Windows Vista and Windows Server 2008 - KB4012598 Windows 7 and Windows Server 2008 R2 - KB4012212 OR KB4012215 Windows Server 2012 - KB4012214 OR KB4012217 Windows 8.1 and Windows Server [...]

By |2018-01-02T11:53:19-05:00May 12th, 2017|Categories: Catch IT, CyberSecurity|

Critical Intel Chip Vulnerability

Threat: Critical Intel Chip Vulnerability from manufactures including: HP, Lenovo, Fujitsu, Dell, & Intel, allow hackers to remotely control the computer. Even if the PC is switched off! Real World Scenarios: A hacker can remotely: capture the keystrokes of your PC thereby stealing usernames and passwords. corrupt the BIOS making [...]

By |2018-01-02T12:31:06-05:00May 11th, 2017|Categories: Catch IT, CyberSecurity|

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |
Go to Top