Catch IT

Using Wi-Fi? KRACK Kills Your Privacy

THREAT: A new flaw has compromised the most widely used Wi-Fi Protocol (WPA2), allowing hackers to decrypt and view everything you are doing online. The exploit is called KRACK, short for Key Reinstallation Attacks.  This breach can be used to steal sensitive information such as credit card numbers, passwords, chat messages, [...]

By |2019-07-31T13:26:14-05:00October 16th, 2017|Categories: Catch IT, CyberSecurity|Tags: , , |

Look out Phishing, here comes Smishing!

Look out Phishing, here comes Smishing! There’s a new scam in town!  Although the name may sound funny, becoming a victim is not joke.  “Smishing” is an identity theft scheme that involves sending consumers text messages containing a link to a fraudulent website or phone number in an attempt to [...]

By |2018-01-02T11:43:14-05:00July 19th, 2017|Categories: Catch IT, CyberSecurity|

Cybersecurity Protocols and the Way We Do Business

The challenges of cybersecurity are changing the business landscape. As the risks associated with a data breach continue to rise, businesses are taking a closer look at their existing protocols and implementing formal risk assessments, policies and standards. Proactive companies not only audit themselves, but also look at vendors [...]

By |2019-07-31T13:08:48-05:00June 12th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

RansomWare sweeping Europe

For people using the following versions of Windows, make sure you have the following patches installed on your machine: Windows Vista and Windows Server 2008 - KB4012598 Windows 7 and Windows Server 2008 R2 - KB4012212 OR KB4012215 Windows Server 2012 - KB4012214 OR KB4012217 Windows 8.1 and Windows Server [...]

By |2018-01-02T11:53:19-05:00May 12th, 2017|Categories: Catch IT, CyberSecurity|

Critical Intel Chip Vulnerability

Threat: Critical Intel Chip Vulnerability from manufactures including: HP, Lenovo, Fujitsu, Dell, & Intel, allow hackers to remotely control the computer. Even if the PC is switched off! Real World Scenarios: A hacker can remotely: capture the keystrokes of your PC thereby stealing usernames and passwords. corrupt the BIOS making [...]

By |2018-01-02T12:31:06-05:00May 11th, 2017|Categories: Catch IT, CyberSecurity|

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |

Major Security Flaws Discovered in Western Digital’s My Cloud NAS Drives

Western Digital (WD) Corporation network-attached storage owners were warned of critical flaws in the company’s My Cloud line of hardware that exposed data stored on the devices to attack. The flaws impact a dozen Western Digital drives that could allow remote adversaries to bypass logins, insert commands, upload files without permission, and gain control [...]

By |2018-01-02T12:45:59-05:00March 13th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , |

Beware of “The “HoeflerText” font wasn’t found” scam

Hackers have crafted a new Google Chrome scam that could infect your computer with malware. A popup, which contains the message “The ‘HoeflerText’ font wasn’t found,” urges users to download an updated “Chrome Font Pack” to their computers. The update, however, is actually a malware download. How You Can Avoid [...]

By |2018-01-02T12:57:52-05:00February 27th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Small Businesses, Contact Your Bank. Fraudulent Money Transfers Are On The Rise.

Cyber thieves steal hundreds of millions of dollars a year from the bank accounts of U.S. businesses.  Hijacking business email accounts, cyber criminals will often impersonate company CEOs/CFOs and send bogus emails that lead to fraudulent withdraws from business accounts.  Often dubbed “whale phishing”, this practice is on the rise [...]

By |2018-05-16T15:23:25-05:00February 3rd, 2017|Categories: Advisory, Catch IT|

Netgear Routers have critical flaw

Threat: Several Netgear routers are vulnerable to remote hacking. Real World Scenarios: A hacker can take over your router and use it for other nefarious purposes. While compromised the router would most likely perform poorly affecting your Internet Access. Mitigation: Here's what you can do - Check for updates for your router [...]

By |2018-05-16T15:28:32-05:00December 14th, 2016|Categories: Catch IT, CyberSecurity|
Go to Top